Dummy Rounds as a DPA Countermeasure in Hardware

作者: Stanislav Jerabek , Jan Schmidt , Martin Novotny , Vojtech Miskovsky

DOI: 10.1109/DSD.2018.00092

关键词: SoftwareSoftware implementationControl reconfigurationCountermeasureEncryptionComputationComputer scienceComputer hardwarePower consumptionRandomness

摘要: This paper describes the technique of Dummy Rounds as a countermeasure against DPA in hardware implementation round-based ciphers. Its principle is inspired by several well-known countermeasures used Hiding and Dynamic Reconfiguration well software implementations cycles, Random order execution or time. Being based on dynamic reconfiguration, this method combines hiding power consumption with In work we also discuss amount randomness available for control computation.

参考文章(19)
Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi, The EM Side-Channel(s) cryptographic hardware and embedded systems. pp. 29- 45 ,(2002) , 10.1007/3-540-36400-5_4
Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures cryptographic hardware and embedded systems. pp. 252- 263 ,(2000) , 10.1007/3-540-44499-8_20
Stefan Tillich, Christoph Herbst, Stefan Mangard, Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis Applied Cryptography and Network Security. pp. 141- 157 ,(2007) , 10.1007/978-3-540-72738-5_10
Christoph Herbst, Elisabeth Oswald, Stefan Mangard, An AES smart card implementation resistant to power analysis attacks applied cryptography and network security. pp. 239- 252 ,(2006) , 10.1007/11767480_16
Daisuke Suzuki, Minoru Saeki, Security evaluation of DPA countermeasures using dual-rail pre-charge logic style cryptographic hardware and embedded systems. pp. 255- 269 ,(2006) , 10.1007/11894063_21
Hendra Guntur, Jun Ishii, Akashi Satoh, Side-channel AttacK User Reference Architecture board SAKURA-G ieee global conference on consumer electronics. pp. 271- 274 ,(2014) , 10.1109/GCCE.2014.7031104
Horst Feistel, Cryptography and Computer Privacy Scientific American. ,vol. 228, pp. 15- 23 ,(1973) , 10.1038/SCIENTIFICAMERICAN0573-15
Alberto Battistello, Christophe Giraud, Fault Analysis of Infective AES Computations workshop on fault diagnosis and tolerance in cryptography. pp. 101- 107 ,(2013) , 10.1109/FDTC.2013.12
C. E. Shannon, Communication theory of secrecy systems Bell System Technical Journal. ,vol. 28, pp. 656- 715 ,(1949) , 10.1002/J.1538-7305.1949.TB00928.X
Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay, Destroying Fault Invariant with Randomization cryptographic hardware and embedded systems. pp. 93- 111 ,(2014) , 10.1007/978-3-662-44709-3_6