• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

M.: Test Apparatus for Side-Channel Resistance Compliance Testing (0)

by M Hutter, J-M Schmidt, Th Plos, Kirschbaum
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA

by Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendoerfer
"... Abstract — Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks use identical devices either for preparation of attacks or for measurements. By the preparation of attacks ..."
Abstract - Add to MetaCart
Abstract — Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks use identical devices either for preparation of attacks or for measurements. By the preparation of attacks the structure and the electrical circuit of devices, that are identical to the target, is analyzed. By side channel attacks usually the same device is used many times for measurements, i.e. measurements on the identical device are made serially in time. Another way is to exploit the difference of side channel leakages; here two identical devices are used parallel, i.e. at the same time. In this paper we investigate the influence of the electrical circuit of a cryptographic implementation on the shape of the resulting power trace, because individualizing of circuits of cryptographic devices can be a new means to prevent attacks that use identical devices. We implemented three different designs that provide exactly the same cryptographic function, i.e. an ECC kP multiplication. For our evaluation we use two different FPGAs. The visualization of the routed design and measurement results show clear differences in the resources consumed as well as in the power traces.
(Show Context)

Citation Context

...s in an individualspower consumption, electromagnetic radiation, etc.sIndividualizing the structure of cryptographic devices preventssfor example the improved power analysis attack reported in [2]sor =-=[3]-=-. Exploiting of the difference of side-channel leakages bysmeasurements on the same FPGA can also be prevented viasgeneration of an individualized design for each new executionsof the cryptographic al...

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks

by Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
"... Abstract. Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provides hints that simplify revealing keys. In a real word a lot of devices, that are identical to the target device, can be attacked before attacking the real targe ..."
Abstract - Add to MetaCart
Abstract. Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provides hints that simplify revealing keys. In a real word a lot of devices, that are identical to the target device, can be attacked before attacking the real target to increase the success of the attack. Their package can be opened and their electromagnetic radiation and structure can be analyzed. Another example of how to improve significantly the success rate of attacks is the measurement of the difference of the side channel leakage of two identical devices, one of these devices being the target, using the Wheatstone bridge measurement setup. Here we propose to in-dividualize the electrical circuit of cryptographic devices in order to prevent at-tacks that use identical devices: attacks, that analyze the structure of devices identical to the target device in a preparation phase; usual side channel attacks, that use always the same target device for collecting many traces, and attacks that use two identical devices at the same time for measuring the difference of side-channel leakages. The proposed individualization can prevent such attacks
(Show Context)

Citation Context

... exploiting differences in side channel leakagesIn the recent past improved physical attacks using bridge-based power measurements, for example with the Wheatstone bridge as it is described in [3] or =-=[4]-=-, havesbeen reported. For this type of attack two identical devices providing exactly the samescryptographic function are necessary. The measurement setup is shown in Fig.1.sFig. 1.sWheatstone bridge ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University