Research on Power Analysis Against Software-based and Hardware-based Cryptographic Circuits

被引:0
作者
Sun, Wei [1 ]
Liu, Jun-Rong [1 ]
Gu, Da-Wu [1 ]
Guo, Zheng [1 ]
Xie, Jun [1 ]
Ma, Bo [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[2] Shanghai Huahong Integrated Circuit Co Ltd, Shanghai 200240, Peoples R China
来源
INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015) | 2015年
关键词
Cryptographic circuits; Side channel attacks; Power analysis; SM3-HMAC;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, cryptographic circuits have been widely used in many fields such as finance, transportation and government business. Such devices have software and hardware implementations, as they both have certain weakness and constraints. In this paper, we research on both software and hardware cryptographic circuits based on the side channel technology. By using different power leakage models, we can point out the weakness operations of a cryptographic circuit that leaks secret information. Furthermore, we research on the differences between software and hardware implementations of SM3-HMAC, and propose power analysis methods respectively.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
[41]   A Side Channel Based Power Analysis Technique for Hardware Trojan Detection using Statistical Learning Approach [J].
Shende, Roshni ;
Ambawade, Dayanand D. .
2016 THIRTEENTH IEEE AND IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2016,
[42]   ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT [J].
Nirmalkumar, P. ;
Perinbam, J. Raja Paul ;
Ravi, S. ;
Rajan, B. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9A) :216-222
[43]   SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA [J].
Jiang, Zijing ;
Yan, Wenhao ;
Ding, Wei ;
Yue, Linlin ;
Ding, Qun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2022, 32 (08)
[44]   Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure [J].
Hibiki, Takafumi ;
Homma, Naofumi ;
Nakano, Yuto ;
Fukushima, Kazuhide ;
Kiyomoto, Shinsaku ;
Miyake, Yutaka ;
Aoki, Takafumi .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) :157-166
[45]   Software Implementation of AES-128: Side Channel Attacks Based on Power Traces Decomposition [J].
Hu, Fanliang ;
Ni, Feng .
2022 INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS), 2022, :14-21
[46]   Hardware Trojan detection method based on the frequency domain characteristics of power consumption [J].
Tang, Nan ;
Zhou, Wanting ;
Li, Lei ;
Yang, Ji ;
Li, Rui ;
He, Yuanhang .
2020 13TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2020), 2020, :410-413
[47]   Enhancing Cryptosystem Security with a Convolutional Neural Network Based Countermeasure Against Power Analysis Attacks [J].
Negabi, Ismail ;
Ait El Asri, Smail ;
El Adib, Samir ;
Raissouni, Naoufal .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025,
[48]   Hardware countermeasure against side-channel attacks based on randomized instruction injection [J].
He, Zhangqing ;
Ao, Tianyong ;
Liu, Kai ;
Dai, Kui .
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2014, 42 (05) :128-132
[49]   Concurrent Faulty Clock Detection for Crypto Circuits against Clock Glitch based DFA [J].
Igarashi, Hiroaki ;
Shi, Youhua ;
Yanagisawa, Masao ;
Togawa, Nozomu .
2013 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2013, :1432-1435
[50]   Architecting against Software Cache-Based Side-Channel Attacks [J].
Kong, Jingfei ;
Aciicmez, Onur ;
Seifert, Jean-Pierre ;
Zhou, Huiyang .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (07) :1276-1288