Exploring Effect of Residual Electric Charges on Cryptographic Circuits: Extended Version
نویسندگان
چکیده
We study a new transistor-level side-channel leakage caused by charges trapped in between stacked transistors namely residual electric (RECs). Building models is important designing countermeasures against attacks (SCAs). The conventional work showed that even measurable with local electromagnetic measurement. One example the current-path leak [1], [2]: an attacker can distinguish number of current path activated during signal transition. Addressing this issue, Sugawara et al. proposed to use mirror circuit has same on its possible paths. show countermeasure insufficient showing leakage, RECs, not covered previous work. RECs carry history gate's state over multiple clock cycles and changes electrical behavior. experimentally verify cause exploitable leakage. also propose REC leaks designed advanced encryption standard-128 (AES-128) circuits using IO-masked dual-rail read-only memory 180-nm complementary metal-oxide-semiconductor (CMOS) process. compared resilience our AES-128 EMA without investigated RECs' effect physically unclonable functions (PUFs). further extend function. demonstrate affect performance arbiter ring-oscillator PUFs through experiments custom chips fabricated 180- 40-nm CMOS processes*.
منابع مشابه
effect of oral presentation on development of l2 learners grammar
this experimental study has been conducted to test the effect of oral presentation on the development of l2 learners grammar. but this oral presentation is not merely a deductive instruction of grammatical points, in this presentation two hypotheses of krashen (input and low filter hypotheses), stevicks viewpoints on grammar explanation and correction and widdowsons opinion on limited use of l1...
15 صفحه اولSearching for Shapes in Cryptographic Protocols (extended version)
We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occurring protocols have only finitely many, indeed very few shapes. Authentication and secrecy properties are easy to determine from them, as are attacks. cpsa, our Cryptographic Protocol Shape Analyzer, implements the method. In se...
متن کاملA Linux kernel cryptographic framework: Decoupling cryptographic keys from applications∗ [extended version]
This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract the keys from storage. The framework makes use of the higher privilege levels of the operating system in order to provide this isolation. The p...
متن کاملExplicit Effect Subtyping (Extended Version)
As popularity of algebraic effects and handlers increases, so does a demand for their efficient execution. Eff, an ML-like language with native support for handlers, has a subtyping-based effect system on which an effect-aware optimizing compiler could be built. Unfortunately, in our experience, implementing optimizations for Eff is overly error-prone because its core language is implicitly-typ...
متن کاملOn the Decidability of (ground) Reachability Problems for Cryptographic Protocols (extended version)
Analysis of cryptographic protocols in a symbolic model is relative to a deduction system that models the possible actions of an attacker regarding an execution of this protocol. We present in this paper a transformation algorithm for such deduction systems provided the equational theory has the finite variant property. the termination of this transformation entails the decidability of the grou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
سال: 2023
ISSN: ['1745-1337', '0916-8508']
DOI: https://doi.org/10.1587/transfun.2022cip0009