2,286 research outputs found

    Power Side Channels in Security ICs: Hardware Countermeasures

    Full text link
    Power side-channel attacks are a very effective cryptanalysis technique that can infer secret keys of security ICs by monitoring the power consumption. Since the emergence of practical attacks in the late 90s, they have been a major threat to many cryptographic-equipped devices including smart cards, encrypted FPGA designs, and mobile phones. Designers and manufacturers of cryptographic devices have in response developed various countermeasures for protection. Attacking methods have also evolved to counteract resistant implementations. This paper reviews foundational power analysis attack techniques and examines a variety of hardware design mitigations. The aim is to highlight exposed vulnerabilities in hardware-based countermeasures for future more secure implementations

    Статистична модель суматора за модулем 2ⁿ для проведення інженерно-криптографічних атак за побічними каналами витоку інформації

    Get PDF
    Запропоновано статистичну модель, досліджено її властивості та запропоновано методику проведення інженерно-криптографічних атак за побічними каналами витоку інформації на комп'ютерну реалізацію операції додавання за модулем 2N.For realization of modular addition with 2N modulus the statistical model has been proposed. Its properties were investigated and a method for the side-channel attack has been proposed

    Методи структурної надлишковості як протидія атакам апаратних помилок

    Get PDF
    Досліджено особливості застосування методів структурної надлишковості для підвищення стійкості апаратних засобів захисту інформації до атаки апаратних помилок. Розглянуто традиційні види структурної надлишковості та резервування Мак-Класкі. Наведено математичні співвідношення для оцінки ефективності застосування різних видів надлишковості.In this paper the particularities of structural redundancy technique usage to increase the resistance of data protection hardware to different fault analysis have been investigated. Traditional structural redundancy as well as Mac-Cluskey redundancy have been considered. The mathematical models to estimate the efficiency of different structural redundancy technique usage have been developed

    KLEIN: A New Family of Lightweight Block Ciphers

    Get PDF
    Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, we describe a new family of lightweight block ciphers named KLEIN, which is designed for resource-constrained devices such as wireless sensors and RFID tags. Compared to the related proposals, KLEIN has advantage in the software performance on legacy sensor platforms, while in the same time its hardware implementation can also be compact
    corecore