Differential Analysis of a Low Energy Table-based Countermeasure for Secure Embedded Systems
نویسنده
چکیده
ABSTRACT Future wireless embedded devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although many embedded devices offer more resistance to bus probing attacks due to their compact size, susceptibility to power or electromagnetic analysis attacks must be analyzed. This paper presents a table masking countermeasure to resist differential power analysis (DPA) and differential electromagnetic analysis (DEMA). Real power and EM measurements are used to verify the countermeasure using 2 and 3 order DPA and DEMA attacks on a popular low energy embedded ARM processor. Results show that the new table masking countermeasure provides increased security without large overheads of energy dissipation compared to previous countermeasures. With the emergence of security applications in PDAs, cellphones, and other embedded devices, low energy countermeasures for resistance to DPA/DEMA is crucial for supporting future wireless embedded systems.
منابع مشابه
Third Order Differential Analysis and A Split Mask Countermeasure For Low Energy Embedded Processors
Future wireless embedded devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although many embedded devices offer more resistance to bus probing attacks due to their compact size, susceptibility to power or electromagnetic analysis attacks must be analyzed. This paper presents a new split mask countermeasure to thwart low order di...
متن کاملRSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks
Fault attacks as introduced by Bellcore in 1996 are still a major threat toward cryptographic products supporting RSA signatures. Most often on embedded devices, the public exponent is unknown, turning resistance to fault attacks into an intricate problem. Over the past few years, several techniques for secure implementations have been published, all of which suffering from inadequacy with the ...
متن کاملLow Overhead DPA Countermeasure using ExCCel (Exploration of Complementary Cells)
—Differential Power Analysis (DPA) side-channel attacks pose serious threats for embedded system security. WDDL was proposed as a countermeasure that can be incorporated into a conventional ASIC design flow using standard cells. However, our spice simulations show that DPA attacks on WDDL still leak secret keys to adversaries despite the doubled area and energy overheads due to the use of compl...
متن کاملSecure Cryptographic Algorithm Implementation on Embedded Platforms
Sensitive systems that are based on smart cards use well-studied and well-developed cryptosystems. Generally these cryptosystems have been subject to rigorous mathematical analysis in an effort to uncover cryptographic weaknesses in the system. The cryptosystems used in smart cards are, therefore, not usually vulnerable to these types of attacks. Since smart cards are small objects that can be ...
متن کاملSecureD: A Secure Dual Core Embedded Processor
Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-in...
متن کامل