126,609 research outputs found
Consolidating masking schemes
In this paper we investigate relations between several masking schemes. We show that the Ishai--Sahai--Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate. The implications of this observation are manifold. We point out a higher-order weakness in higher-order Threshold Implementations, suggest a mitigation and provide new sharings that use a lower number of input shares
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
First-order secure Threshold Implementations (TI) of symmetric cryptosystems provide provable security at a moderate overhead; yet attacks using higher-order statistical moments are still feasible. Cryptographic instances compliant to Higher-Order Threshold Implementation (HO-TI) can prevent such attacks, however, usually at unacceptable implementation costs. As an alternative concept we investigate in this work the idea of dynamic hardware modification, i.e., random changes and transformations of cryptographic implementations in order to render higher-order attacks on first-order TI impractical. In a first step, we present a generic methodology which can be applied to (almost) every cryptographic implementation. In order to investigate the effectiveness of our proposed strategy, we use an instantiation of our methodology that adapts ideas from White-Box Cryptography and applies this construction to a first-order secure TI. Further, we show that dynamically updating cryptographic implementations during operation provides the ability to avoid higher-order leakages to be practically exploitable
Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON
Securing data transmission has always been a challenge. While many cryptographic algorithms are available to solve the problem, many applications have tough area constraints while requiring high-level security. Lightweight cryptography aims at achieving high-level security with the benefit of being low cost. Since the late nineties and with the discovery of side channel attacks the approach towards cryptography has changed quite significantly. An attacker who can get close to a device can extract sensitive data by monitoring side channels such as power consumption, sound, or electromagnetic emanation. This means that embedded implementations of cryptographic schemes require protection against such attacks to achieve the desired level of security. In this work we combine a low-cost embedded cipher, Simon, with a stateof-the-art side channel countermeasure called Threshold Implementation (TI). We show that TI is a great match for lightweight cryptographic ciphers, especially for hardware implementation. Our implementation is the smallest TI of a block-cipher on an FPGA. This implementation utilizes 96 slices of a low-cost Spartan-3 FPGA and 55 slices a modern Kintex-7 FPGA. Moreover, we present a higher order TI which is resistant against second order attacks. This implementation utilizes 163 slices of a Spartan-3 FPGA and 95 slices of a Kintex-7 FPGA. We also present a state of the art leakage analysis and, by applying it to the designs, show that the implementations achieve the expected security. The implementations even feature a significant robustness to higher order attacks, where several million observations are needed to detect leakage
ANTENNA FOR WIRELESS UNDERGROUND COMMUNICATION
Systems and methods are disclosed for an underground antenna structure for radiating through a dissipative medium, the antenna structure. The antenna structure includes a dielectric substrate, a feeding structure disposed on the substrate, and one or more electrical conductors. The one or more electrical conductors are disposed on the substrate, oriented, and buried within the dissipative medium. The electrical conductors are also adapted to radiate signals at a frequency in half-space adjacent to the dissipative medium. The adaptation includes a beamwidth state for one or more of the electrical conductors based at least in part on the relative permittivity of the dissipative medium
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
Side-channel analysis and fault-injection attacks are known as serious threats to cryptographic hardware implementations and the combined protection against both is currently an open line of research. A promising countermeasure with considerable implementation overhead appears to be a mix of first-order secure Threshold Implementations and linear Error-Correcting Codes.
In this paper we employ for the first time the inherent structure of non-systematic codes as fault countermeasure which dynamically mutates the applied generator matrices to achieve a higher-order side-channel and fault-protected design. As a case study, we apply our scheme to the PRESENT block cipher that do not show any higher-order side-channel leakage after measuring 150 million power traces
Visual Spike-based Convolution Processing with a Cellular Automata Architecture
this paper presents a first approach for
implementations which fuse the Address-Event-Representation
(AER) processing with the Cellular Automata using FPGA and
AER-tools. This new strategy applies spike-based convolution
filters inspired by Cellular Automata for AER vision
processing. Spike-based systems are neuro-inspired circuits
implementations traditionally used for sensory systems or
sensor signal processing. AER is a neuromorphic
communication protocol for transferring asynchronous events
between VLSI spike-based chips. These neuro-inspired
implementations allow developing complex, multilayer,
multichip neuromorphic systems and have been used to design
sensor chips, such as retinas and cochlea, processing chips, e.g.
filters, and learning chips. Furthermore, Cellular Automata is a
bio-inspired processing model for problem solving. This
approach divides the processing synchronous cells which
change their states at the same time in order to get the solution.Ministerio de Educación y Ciencia TEC2006-11730-C03-02Ministerio de Ciencia e Innovación TEC2009-10639-C04-02Junta de Andalucía P06-TIC-0141
Poisson-Boltzmann Theory of Charged Colloids: Limits of the Cell Model for Salty Suspensions
Thermodynamic properties of charge-stabilised colloidal suspensions are
commonly modeled by implementing the mean-field Poisson-Boltzmann (PB) theory
within a cell model. This approach models a bulk system by a single macroion,
together with counterions and salt ions, confined to a symmetrically shaped,
electroneutral cell. While easing solution of the nonlinear PB equation, the
cell model neglects microion-induced correlations between macroions, precluding
modeling of macroion ordering phenomena. An alternative approach, avoiding
artificial constraints of cell geometry, maps a macroion-microion mixture onto
a one-component model of pseudo-macroions governed by effective interactions.
In practice, effective-interaction models are usually based on linear screening
approximations, which can accurately describe nonlinear screening only by
incorporating an effective (renormalized) macroion charge. Combining charge
renormalization and linearized PB theories, in both the cell model and an
effective-interaction (cell-free) model, we compute osmotic pressures of highly
charged colloids and monovalent microions over a range of concentrations. By
comparing predictions with primitive model simulation data for salt-free
suspensions, and with predictions of nonlinear PB theory for salty suspensions,
we chart the limits of both the cell model and linear-screening approximations
in modeling bulk thermodynamic properties. Up to moderately strong
electrostatic couplings, the cell model proves accurate in predicting osmotic
pressures of deionized suspensions. With increasing salt concentration,
however, the relative contribution of macroion interactions grows, leading
predictions of the cell and effective-interaction models to deviate. No
evidence is found for a liquid-vapour phase instability driven by monovalent
microions. These results may guide applications of PB theory to soft materials.Comment: 27 pages, 5 figures, special issue of Journal of Physics: Condensed
Matter on "Classical density functional theory methods in soft and hard
matter
- …