Countermeasures for timing-based side-channel attacks against shared, modern computing hardware
نویسندگان
چکیده
منابع مشابه
Provably Secure Countermeasures against Side-channel Attacks
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak information about the secret key. In power analysis attacks, the observable leakage is the power consumption of the device, which is dependent on the processed data and the performed operations. Masking is a widely used countermeasure to thwart the powerful Differential Power Analysis (DPA) attacks. ...
متن کاملSMT-Based Verification of Software Countermeasures against Side-Channel Attacks
A common strategy for designing countermeasures against side channel attacks is using randomization techniques to remove the statistical dependency between sensitive data and side-channel emissions. However, this process is both labor intensive and error prone, and currently, there is a lack of automated tools to formally access how secure a countermeasure really is. We propose the first SMT so...
متن کاملCountermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems
In recent years, some attacks on cryptographic systems have been deviced, exploiting the leakage of information through so-called “side channels”. When a real-life device is performing a coding or decoding procedure, one can measure quantities such as the time employed, the profile of power consumption, the contents of a particular memory cell. If the algorithm is known, this information can ge...
متن کاملSynthesis of Masking Countermeasures against Side Channel Attacks
We propose a new synthesis method for generating countermeasures for cryptographic software code to mitigate power analysis based side channel attacks. Side channel attacks may arise when computers and microchips leak sensitive information about the software code and data that they process, e.g., through power dissipation or electromagnetic radiation. Such information leaks have been exploited ...
متن کاملPractical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks
This paper analyzes the robustness of RSA countermeasures against electromagnetic analysis and collision attacks. The proposed RSA cryptosystem uses residue number systems (RNS) for fast executions of the modular calculi with large numbers. The parallel architecture is protected at arithmetic and algorithmic levels by using the Montgomery Ladder and the Leak Resistant Arithmetic countermeasures...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electronic Security and Digital Forensics
سال: 2019
ISSN: 1751-911X,1751-9128
DOI: 10.1504/ijesdf.2019.10020551