[Resource Topic] 2014/342: Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis

Welcome to the resource topic for 2014/342

Title:
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis

Authors: Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer

Abstract:

Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks are normally prepared by analyzing devices that are identical to the real target. Here we propose to individualize the design of cryptographic devices in order to prevent attacks that use identical devices. We implemented three different designs that provide exactly the same cryptographic function, i.e. an ECC kP multiplication. The synthesis and power simulation results show clear differences in the area consumed as well as in the power traces. We envision that this type of protection mechanism is relevant e.g. for wireless sensor networks from which devices can easily be stolen for further analysis in the lab.

ePrint: https://eprint.iacr.org/2014/342

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .