A new countermeasure against side-channel attacks based on hardware-software co-design
Autor: | Enrique Canto-Navarro, Mariano Lopez-Garcia, Ruben Lumbiarres-Lopez |
---|---|
Přispěvatelé: | Universitat Politècnica de Catalunya. Departament d'Enginyeria de Sistemes, Automàtica i Informàtica Industrial, Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica, Universitat Politècnica de Catalunya. Centre de Desenvolupament Tecnològic de Sistemes d'Adquisició Remota i Tractament de la Informació (SARTI), Universitat Politècnica de Catalunya. SARTI - Centre de Desenvolupament Tecnològic de Sistemes d'Adquisició Remota i Tractament de la Informació |
Jazyk: | angličtina |
Rok vydání: | 2016 |
Předmět: |
Contramesures electròniques
Coprocessor Correctness Computer Networks and Communications Computer science Side-channel analysis AES algorithm and hardware-software co-design 02 engineering and technology Encryption Artificial Intelligence Informàtica [Àrees temàtiques de la UPC] Countermeasure 0202 electrical engineering electronic engineering information engineering Side channel attack Hardware_ARITHMETICANDLOGICSTRUCTURES Field-programmable gate array Microprocessors Hardware architecture Virtex business.industry Electronic countermeasures Enginyeria electrònica [Àrees temàtiques de la UPC] Criptografia 020202 computer hardware & architecture Hardware and Architecture Embedded system Encriptació de dades (Informàtica) Key (cryptography) Cryptography Microprocessadors 020201 artificial intelligence & image processing business Software |
Zdroj: | UPCommons. Portal del coneixement obert de la UPC Universitat Politècnica de Catalunya (UPC) Recercat. Dipósit de la Recerca de Catalunya instname |
DOI: | 10.1016/j.micpro.2016.06.009 |
Popis: | This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design. The hardware architecture consists of a microprocessor, which executes the algorithm using a false key, and a coprocessor that performs several operations that are necessary to retrieve the original text that was encrypted with the real key. The coprocessor hardly affects the power consumption of the device, so that any classical attack based on such power consumption would reveal a false key. Additionally, as the operations carried out by the coprocessor are performed in parallel with the microprocessor, the execution time devoted for encrypting a specific text is not affected by the proposed countermeasure. In order to verify the correctness of our proposal, the system was implemented on a Virtex 5 FPGA. Different SCA attacks were performed on several functions of AES algorithm. Experimental results show in all cases that the system is effectively protected by revealing a false encryption key. |
Databáze: | OpenAIRE |
Externí odkaz: |