Research on Power Analysis Against Software-based and Hardware-based Cryptographic Circuits

被引:0
作者
Sun, Wei [1 ]
Liu, Jun-Rong [1 ]
Gu, Da-Wu [1 ]
Guo, Zheng [1 ]
Xie, Jun [1 ]
Ma, Bo [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[2] Shanghai Huahong Integrated Circuit Co Ltd, Shanghai 200240, Peoples R China
来源
INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015) | 2015年
关键词
Cryptographic circuits; Side channel attacks; Power analysis; SM3-HMAC;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, cryptographic circuits have been widely used in many fields such as finance, transportation and government business. Such devices have software and hardware implementations, as they both have certain weakness and constraints. In this paper, we research on both software and hardware cryptographic circuits based on the side channel technology. By using different power leakage models, we can point out the weakness operations of a cryptographic circuit that leaks secret information. Furthermore, we research on the differences between software and hardware implementations of SM3-HMAC, and propose power analysis methods respectively.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
[21]   SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE [J].
Zhao, Shijun ;
Zhang, Qianying ;
Qin, Yu ;
Feng, Wei ;
Feng, Dengguo .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1723-1740
[22]   A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation [J].
Gornik, Andreas ;
Moradi, Amir ;
Oehm, Juergen ;
Paar, Christof .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) :1308-1319
[23]   Research of Power Analysis Based on Ensemble Model [J].
Liu B. ;
Pan Y. ;
Xu S.-W. ;
Li J.-L. ;
Feng H.-M. .
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (02) :253-258
[24]   SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits∗ [J].
Tan, Huiyu ;
Gao, Pengfei ;
Song, Fu ;
Chen, Taolue ;
Wu, Zhilin .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (04) :1-39
[25]   Uncertainty Analysis in Cryptographic Key Recovery for Machine Learning-Based Power Measurements Attacks [J].
Arpaia, Pasquale ;
Caputo, Francesco ;
Cioffi, Antonella ;
Esposito, Antonio ;
Isgro, Francesco .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2023, 72
[26]   On Power-Analysis Resistant Hardware Implementations of ECC-Based Cryptosystems [J].
Willi, Roman ;
Curiger, Andreas ;
Zbinden, Paul .
19TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2016), 2016, :665-669
[27]   Silicon Based Security for Protection Against Hardware Vulnerabilities [J].
Kaur, Shaminder ;
Singh, Balwinder ;
Kaur, Harsimranjit .
SILICON, 2022, 14 (05) :2421-2427
[28]   Correction Method for Power Analysis of Digital Integrated Circuits Based on Standard Cells [J].
Li, Qunlin ;
Lyu, Zejia ;
Shen, Jizhong .
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2025,
[29]   Silicon Based Security for Protection Against Hardware Vulnerabilities [J].
Shaminder Kaur ;
Balwinder Singh ;
Harsimranjit Kaur .
Silicon, 2022, 14 :2421-2427
[30]   Scrambler Based AES for Countermeasure Against Power Analysis Attacks [J].
Kang, Young-Jin ;
Kim, Ki-Hwan ;
Lee, HoonJae .
ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, 2020, 590 :152-157