Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design
نویسندگان
چکیده
منابع مشابه
Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design
Cryptographic cores are known to leak information about their private key due to runtime variations, and there are many well-known attacks that can exploit this timing channel. In this work, we study how information theoretic measures can quantify the amount of key leakage that can be exacted from runtime measurements. We develop and analyze twenty two RSA hardware designs – each with unique pe...
متن کاملSecurity evaluation at design time for cryptographic hardware
Consumer security devices are becoming ubiquitous, from pay-TV through mobile phones, PDA, prepayment gas meters to smart cards. There are many ongoing research efforts to keep these devices secure from opponents who try to retrieve key information by observation or manipulation of the chip’s components. In common industrial practise, it is after the chip has been manufactured that security eva...
متن کاملOptimizations in the Design of Cryptographic Hardware
The architectures that are used in the increasingly popular area of cryptography are discussed. In the design of cryptographic systems optimization in speed and area are important for surpassing acceptable standards. Many methods have been explored in the literature with regard to optimizations in speed. Although area is not as critical as the aforementioned constraint, it is closely related to...
متن کاملSoftware/Hardware Co-Design of Efficient and Secure Cryptographic Hardware
Most cryptographic systems are based on the modular exponentiation to perform the non-linear scrambling operation of data. It is performed using successive modular multiplications, which are time consuming for large operands. Accelerating cryptography needs optimising the time consumed by a single modular multiplication and/or reducing the total number of modular multiplications performed. Usin...
متن کاملA Hardware Design Model for Cryptographic Algorithms
A hardware implementation model is proposed that can be used in the design of stream ciphers, block ciphers and cryptographic hash functions. The cryptographic nite state machine (CFSM) model is no mathematical tool, but a set of criteria that have to be met by a real hardware nite state machine that will be used in the implementation of a cryptographic algorithm. Diiusion is studied by means o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
سال: 2018
ISSN: 0278-0070,1937-4151
DOI: 10.1109/tcad.2017.2768420