Protections against Side-Channel Attacks
نویسندگان
چکیده
in French 5
منابع مشابه
Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks. (Unités arithmétiques reconfigurables pour cryptoprocesseurs robustes aux attaques)
in French 5
متن کاملRandomizing Scalar Multiplication Using Exact Covering Systems of Congruences
In this paper we present a generic, uniformly randomized scalar multiplication algorithm based on covering systems of congruences, with built-in protections against various side-channel attacks. It has been tailored to resist a recent class of attacks called horizontal attacks. These very powerful attacks exploit some unsuspected weaknesses hidden in most, if not all, highly regular and constan...
متن کاملDefeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force
Side-channel analysis is a well-known and efficient hardware technique to recover embedded secrets in microprocessors. Countermeasures relying on random masking have been proven to be sound protections against such threats and are usually added to protect sensitive intermediate data during the algorithm process. However, SecondOrder Side-Channel Analysis have proven to allow secret key recovery...
متن کاملSide-Channel Protections for Cryptographic Instruction Set Extensions
Over the past few years, the microprocessor industry has introduced accelerated cryptographic capabilities through instruction set extensions. Although powerful and resistant to side-channel analysis such as cache and timing attacks, these instructions do not implicitly protect against power-based side-channel attacks, such as DPA. This paper provides a specific example with Intel’s AES-NI cryp...
متن کاملDifferential Power Analysis in the Presence of Hardware Countermeasures
The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different countermeasures to thwart these attacks have been proposed and implemented in general, such protections do not make attacks infeasible, but increase the attacker’s experimental (data acquisition) and computational (data processi...
متن کامل