IC 1204 : Trustworthy Manufacturing and Utilization of Secure Devices
نویسنده
چکیده
During my visit to FER I worked on several projects that relate to the activities of COST action working groups. More specifically, projects related with groups WG3-Fault attack detection and protection, WG4-Reconfigurable devices for secure functions and WG5-Validation, Evaluation, and Fault Injection. First project deals with the improvements of side channel resistance of nonlinear elements of stream and block ciphers. Increase in DPA resistance can be obtained by changing current nonlinear elements with those that have better transparency order property. Transparency order property defines the resistance of S-boxes to DPA attacks. As presented in [1], our results confirm there is an increase in the number of needed traces when S-box with better transparency order is used. For the 8x8 case, we succeeded in lowering transparency order from 7.86 (AES case) to 7.35 which is as far as we know current lowest transparency order result for S-box of that size. After working on 8x8 case, when I arrived to FER we continued to conduct the research for the 4x4 case as well as for Boolean functions. When considering 4x4 case, we found S-boxes that belong to the optimal S-boxes classification (they have best set of properties to protect against linear and differential cryptanalysis) but with better DPA resistance. In accordance with that, we conducted experiments with the PRESENT algorithm (comparing original PRESENT S-box and our evolved S-box) and we found that our new S-box has better DPA resistance. From cryptographic properties perspective, we lowered transparency order from 3.53 (PRESENT) to 3.2 value while keeping nonlinearity and delta uniformity at the maximal value of 4. Furthermore, we showed that S-boxes are not affine invariant when considering transparency order or SNR (DPA) properties (properties related with side channel resistance). Results of those experiments will be presented at the HOST conference [3]. Our
منابع مشابه
Trustworthy Hardware [Scanning the Issue]
Since the 1990s, there has been a steady trend away from inhouse integrated circuit (IC) design and fabrication toward outsourcing various aspects of design, fabrication, testing, and packaging of ICs. The emergence of such a globalized, horizontal semiconductor business model created hitherto unknown security and trust concerns in the ICs and the information systems (rooted in these ICs), whic...
متن کاملExtended Value Added Intellectual Coefficient in Advanced and Low Technology Manufacturing Companies in Malaysia
The main purpose of this study is to empirically compare of intellectual capital (IC) and its efficiency between advanced and low technology manufacturing companies using a sample of 135 Malaysian listed manufacturing companies during the 2006-2012 period. The manufacturing companies are classified into different sectors based on their products and services (Standard Industrial Classification (...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملAn Efficient Algorithm to Solve Utilization-based Model for Cellular Manufacturing Systems
The design of cellular manufacturing system (CMS) involves many structural and operational issues. One of the important CMS design steps is the formation of part families and machine cells which is called cell formation. In this paper, we propose an efficient algorithm to solve a new mathematical model for cell formation in cellular manufacturing systems based on cell utilization concept. The p...
متن کاملImproving Mobile Device Security with Operating System-Level Virtualization
In this paper, we propose a lightweight mechanism to isolate one or more Android userland instances from a trustworthy and secure entity. This entity controls and manages the Android instances and provides an interface for remote administration and management of the device and its software. Our approach includes several security extensions for secure network access, integrity protection of data...
متن کامل