Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?
نویسندگان
چکیده
Higher-order side-channel attacks are becoming amongst the major interests of academia as well as industry sector. It is indeed being motivated by the development of countermeasures which can prevent the leakages up to certain orders. As a concrete example, threshold implementation (TI) as an efficient way to realize Boolean masking in hardware is able to avoid first-order leakages. Trivially, the attacks conducted at second (and higher) orders can exploit the corresponding leakages hence devastating the provided security. Hence, the extension of TI to higher orders was being expected which has been presented at ASIACRYPT 2014. Following its underlying univariate settings it can provide security at higher orders, and its area and time overheads naturally increase with the desired security order. In this work we look at the feasibility of higher-order attacks on firstorder TI from another perspective. Instead of increasing the order of resistance by employing higher-order TIs, we realize the first-order TI designs following the principles of a power-equalization technique dedicated to FPGA platforms, that naturally leads to hardening higherorder attacks. We show that although the first-order TI designs, which are additionally equipped by the power-equalization methodology, have significant area overhead, they can maintain the same throughput and more importantly can avoid the higher-order leakages to be practically exploitable by up to 1 billion traces.
منابع مشابه
Total Knee Arthroplasty in Patients with Retention of Prior Hardware Material: What is the Outcome?
Background: There is an information gap in literature regarding postoperative outcome of total knee arthroplasty (TKA)in patients with hardware in-situ from the previous knee surgery. The present study aims to evaluate impact of retainedhardware on short-term outcome of TKA patients.Methods: Perioperative radiographs of patients who had undergone TKA between 2007 and 2012 were reviewedand patie...
متن کاملتعیین شاخصهای مناسب اندازهگیری سرمایه اجتماعی در رتبه بندی دانشکده های کشاورزی
Objectives (problem): social capital is the most important dynamic social and cultural element in every society. Universities can transfer Ideas, Values and Social norms with solidarity for students. this investigation has emphasis the role of universities and higher education institutes as a center of formation and development of social capital to follow catch the Macro socio- economic and...
متن کاملتعیین شاخصهای مناسب اندازهگیری سرمایه اجتماعی در رتبه بندی دانشکده های کشاورزی
Objectives (problem): social capital is the most important dynamic social and cultural element in every society. Universities can transfer Ideas, Values and Social norms with solidarity for students. this investigation has emphasis the role of universities and higher education institutes as a center of formation and development of social capital to follow catch the Macro socio- economic and...
متن کاملAffine Equivalence and Its Application to Tightening Threshold Implementations
Motivated by the development of Side-Channel Analysis (SCA) countermeasures which can provide security up to a certain order, defeating higher-order attacks has become amongst the most challenging issues. For instance, Threshold Implementation (TI) which nicely solves the problem of glitches in masked hardware designs is able to avoid firstorder leakages. Hence, its extension to higher orders a...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015