2,286 research outputs found
Power Side Channels in Security ICs: Hardware Countermeasures
Power side-channel attacks are a very effective cryptanalysis technique that
can infer secret keys of security ICs by monitoring the power consumption.
Since the emergence of practical attacks in the late 90s, they have been a
major threat to many cryptographic-equipped devices including smart cards,
encrypted FPGA designs, and mobile phones. Designers and manufacturers of
cryptographic devices have in response developed various countermeasures for
protection. Attacking methods have also evolved to counteract resistant
implementations. This paper reviews foundational power analysis attack
techniques and examines a variety of hardware design mitigations. The aim is to
highlight exposed vulnerabilities in hardware-based countermeasures for future
more secure implementations
Статистична модель суматора за модулем 2ⁿ для проведення інженерно-криптографічних атак за побічними каналами витоку інформації
Запропоновано статистичну модель, досліджено її властивості та запропоновано методику проведення інженерно-криптографічних атак за побічними каналами витоку інформації на комп'ютерну реалізацію операції додавання за модулем 2N.For realization of modular addition with 2N modulus the statistical model has been proposed. Its properties were investigated and a method for the side-channel attack has been proposed
Методи структурної надлишковості як протидія атакам апаратних помилок
Досліджено особливості застосування методів структурної надлишковості для підвищення стійкості апаратних засобів захисту інформації до атаки апаратних помилок. Розглянуто традиційні види структурної надлишковості та резервування Мак-Класкі. Наведено математичні співвідношення для оцінки ефективності застосування різних видів надлишковості.In this paper the particularities of structural redundancy technique usage to increase the resistance of data protection hardware to different fault analysis have been investigated. Traditional structural redundancy as well as Mac-Cluskey redundancy have been considered. The mathematical models to estimate the efficiency of different structural redundancy technique usage have been developed
KLEIN: A New Family of Lightweight Block Ciphers
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, we describe a new family of lightweight block ciphers named KLEIN, which is designed for resource-constrained devices such as wireless sensors and RFID tags. Compared to the related proposals, KLEIN has advantage in the software performance on legacy sensor platforms, while in the same time its hardware implementation can also be compact
- …