126,609 research outputs found

    Consolidating masking schemes

    Get PDF
    In this paper we investigate relations between several masking schemes. We show that the Ishai--Sahai--Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate. The implications of this observation are manifold. We point out a higher-order weakness in higher-order Threshold Implementations, suggest a mitigation and provide new sharings that use a lower number of input shares

    Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware

    Get PDF
    First-order secure Threshold Implementations (TI) of symmetric cryptosystems provide provable security at a moderate overhead; yet attacks using higher-order statistical moments are still feasible. Cryptographic instances compliant to Higher-Order Threshold Implementation (HO-TI) can prevent such attacks, however, usually at unacceptable implementation costs. As an alternative concept we investigate in this work the idea of dynamic hardware modification, i.e., random changes and transformations of cryptographic implementations in order to render higher-order attacks on first-order TI impractical. In a first step, we present a generic methodology which can be applied to (almost) every cryptographic implementation. In order to investigate the effectiveness of our proposed strategy, we use an instantiation of our methodology that adapts ideas from White-Box Cryptography and applies this construction to a first-order secure TI. Further, we show that dynamically updating cryptographic implementations during operation provides the ability to avoid higher-order leakages to be practically exploitable

    Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON

    Get PDF
    Securing data transmission has always been a challenge. While many cryptographic algorithms are available to solve the problem, many applications have tough area constraints while requiring high-level security. Lightweight cryptography aims at achieving high-level security with the benefit of being low cost. Since the late nineties and with the discovery of side channel attacks the approach towards cryptography has changed quite significantly. An attacker who can get close to a device can extract sensitive data by monitoring side channels such as power consumption, sound, or electromagnetic emanation. This means that embedded implementations of cryptographic schemes require protection against such attacks to achieve the desired level of security. In this work we combine a low-cost embedded cipher, Simon, with a stateof-the-art side channel countermeasure called Threshold Implementation (TI). We show that TI is a great match for lightweight cryptographic ciphers, especially for hardware implementation. Our implementation is the smallest TI of a block-cipher on an FPGA. This implementation utilizes 96 slices of a low-cost Spartan-3 FPGA and 55 slices a modern Kintex-7 FPGA. Moreover, we present a higher order TI which is resistant against second order attacks. This implementation utilizes 163 slices of a Spartan-3 FPGA and 95 slices of a Kintex-7 FPGA. We also present a state of the art leakage analysis and, by applying it to the designs, show that the implementations achieve the expected security. The implementations even feature a significant robustness to higher order attacks, where several million observations are needed to detect leakage

    ANTENNA FOR WIRELESS UNDERGROUND COMMUNICATION

    Get PDF
    Systems and methods are disclosed for an underground antenna structure for radiating through a dissipative medium, the antenna structure. The antenna structure includes a dielectric substrate, a feeding structure disposed on the substrate, and one or more electrical conductors. The one or more electrical conductors are disposed on the substrate, oriented, and buried within the dissipative medium. The electrical conductors are also adapted to radiate signals at a frequency in half-space adjacent to the dissipative medium. The adaptation includes a beamwidth state for one or more of the electrical conductors based at least in part on the relative permittivity of the dissipative medium

    Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures

    Get PDF
    Side-channel analysis and fault-injection attacks are known as serious threats to cryptographic hardware implementations and the combined protection against both is currently an open line of research. A promising countermeasure with considerable implementation overhead appears to be a mix of first-order secure Threshold Implementations and linear Error-Correcting Codes. In this paper we employ for the first time the inherent structure of non-systematic codes as fault countermeasure which dynamically mutates the applied generator matrices to achieve a higher-order side-channel and fault-protected design. As a case study, we apply our scheme to the PRESENT block cipher that do not show any higher-order side-channel leakage after measuring 150 million power traces

    Visual Spike-based Convolution Processing with a Cellular Automata Architecture

    Get PDF
    this paper presents a first approach for implementations which fuse the Address-Event-Representation (AER) processing with the Cellular Automata using FPGA and AER-tools. This new strategy applies spike-based convolution filters inspired by Cellular Automata for AER vision processing. Spike-based systems are neuro-inspired circuits implementations traditionally used for sensory systems or sensor signal processing. AER is a neuromorphic communication protocol for transferring asynchronous events between VLSI spike-based chips. These neuro-inspired implementations allow developing complex, multilayer, multichip neuromorphic systems and have been used to design sensor chips, such as retinas and cochlea, processing chips, e.g. filters, and learning chips. Furthermore, Cellular Automata is a bio-inspired processing model for problem solving. This approach divides the processing synchronous cells which change their states at the same time in order to get the solution.Ministerio de Educación y Ciencia TEC2006-11730-C03-02Ministerio de Ciencia e Innovación TEC2009-10639-C04-02Junta de Andalucía P06-TIC-0141

    Poisson-Boltzmann Theory of Charged Colloids: Limits of the Cell Model for Salty Suspensions

    Full text link
    Thermodynamic properties of charge-stabilised colloidal suspensions are commonly modeled by implementing the mean-field Poisson-Boltzmann (PB) theory within a cell model. This approach models a bulk system by a single macroion, together with counterions and salt ions, confined to a symmetrically shaped, electroneutral cell. While easing solution of the nonlinear PB equation, the cell model neglects microion-induced correlations between macroions, precluding modeling of macroion ordering phenomena. An alternative approach, avoiding artificial constraints of cell geometry, maps a macroion-microion mixture onto a one-component model of pseudo-macroions governed by effective interactions. In practice, effective-interaction models are usually based on linear screening approximations, which can accurately describe nonlinear screening only by incorporating an effective (renormalized) macroion charge. Combining charge renormalization and linearized PB theories, in both the cell model and an effective-interaction (cell-free) model, we compute osmotic pressures of highly charged colloids and monovalent microions over a range of concentrations. By comparing predictions with primitive model simulation data for salt-free suspensions, and with predictions of nonlinear PB theory for salty suspensions, we chart the limits of both the cell model and linear-screening approximations in modeling bulk thermodynamic properties. Up to moderately strong electrostatic couplings, the cell model proves accurate in predicting osmotic pressures of deionized suspensions. With increasing salt concentration, however, the relative contribution of macroion interactions grows, leading predictions of the cell and effective-interaction models to deviate. No evidence is found for a liquid-vapour phase instability driven by monovalent microions. These results may guide applications of PB theory to soft materials.Comment: 27 pages, 5 figures, special issue of Journal of Physics: Condensed Matter on "Classical density functional theory methods in soft and hard matter
    corecore