An Instruction Set Extension to Support Software-Based Masking
نویسندگان
چکیده
In both hardware and software, masking can represent an effective means of hardening implementation against side-channel attack vectors such as Differential Power Analysis (DPA). Focusing on however, the use present various challenges: specifically, it often 1) requires significant effort to translate any theoretical security properties into practice, and, even then, 2) imposes a overhead in terms efficiency. To address challenges, this paper explores Instruction Set Extension (ISE) support software-based implementations range (symmetric) cryptographic kernels including AES: we design, implement, evaluate ISE, using RISC-V base ISA. Our ISE-supported first-order masked AES, for example, is order magnitude more efficient than software-only alternative with respect execution latency memory footprint; renders comparable unmasked same metrics, but also secure.
منابع مشابه
Instruction Set Limitation in Support of Software Diversity
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a tool to match corresponding program fragments in different, diversified program versions. The proposed technique limits the types of instructions occurring in a program to the most frequently occurring types, by repl...
متن کاملAn End-to-End Design Flow for Automated Instruction Set Extension and Complex Instruction Selection based on GCC
Extensible processors are application-specific instruction set processors (ASIPs) that allow for customisation through user-defined instruction set extensions (ISE) implemented in an extended micro architecture. Traditional design flows for ISE typically involve a large number of different tools for processing of the target application written in C, ISE identification, generation, optimisation ...
متن کاملHASHI: An Application Specific Instruction Set Extension for Hashing
Hashing is one of the most relevant operations within query processing. Almost all core database operators like groupby, selections, or different join implementations rely on highly efficient hash implementations. In this paper, we present a way to significantly improve performance and energy efficiency of hash operations using specialized instruction set extensions for the Tensilica Xtensa LX5...
متن کاملExtension Error Set Based on Extension Set
This paper gives the concepts of extension error set and fuzzy extension error set, discusses diverse extension error set and fuzzy extension error set based on extension set and error set, and puts forward the relevant propositions and operations. Finally, it provides proofs of the soundness and completeness for the propositions and operations.
متن کاملSoftware Development Tool Generation Method Suitable for Instruction Set Extension of Embedded Processors
This paper proposes a method of software development tool generation suitable for instruction set extension of existing embedded processors. The key idea in the proposed method is to enhance a base processor’s toolchain by adding plugins, which are software components that handle additional instructions and registers. The proposed method can generate a compiler, assembler, disassembler, and ins...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2021
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2021.i4.283-325