Third Order Differential Analysis and A Split Mask Countermeasure For Low Energy Embedded Processors

نویسنده

  • Catherine H. Gebotys
چکیده

Future wireless embedded devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although many embedded devices offer more resistance to bus probing attacks due to their compact size, susceptibility to power or electromagnetic analysis attacks must be analyzed. This paper presents a new split mask countermeasure to thwart low order differential power analysis (DPA) and differential EM analysis (DEMA). For the first time real power and EM measurements are used to analyze the difficulty of launching new 3 order DPA and DEMA attacks on a popular low energy 32-bit embedded ARM processor. Results show that the new split mask countermeasure provides increased security without large overheads of energy dissipation compared to previous research. With the emergence of security applications in PDAs, cellphones, and other embedded devices, low energy countermeasures for resistance to low order DPA/DEMA is crucial for supporting future wireless internet enabled devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Analysis of a Low Energy Table-based Countermeasure for Secure Embedded Systems

ABSTRACT Future wireless embedded devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although many embedded devices offer more resistance to bus probing attacks due to their compact size, susceptibility to power or electromagnetic analysis attacks must be analyzed. This paper presents a table masking countermeasure to resist diff...

متن کامل

Two Power Analysis Attacks against One-Mask Methods

In order to protect a cryptographic algorithm against Power Analysis attacks, a well-known method consists in hiding all the internal data with randomly chosen masks. Following this idea, an AES implementation can be protected against Differential Power Analysis (DPA) by the “Transformed Masking Method”, proposed by Akkar and Giraud at CHES’2001, requiring two distinct masks. At CHES’2002, Tric...

متن کامل

Low Overhead DPA Countermeasure using ExCCel (Exploration of Complementary Cells)

—Differential Power Analysis (DPA) side-channel attacks pose serious threats for embedded system security. WDDL was proposed as a countermeasure that can be incorporated into a conventional ASIC design flow using standard cells. However, our spice simulations show that DPA attacks on WDDL still leak secret keys to adversaries despite the doubled area and energy overheads due to the use of compl...

متن کامل

Towards Increased Power Efficiency in Low End Embedded Processors: Can Cache Help?

Embedded processors are often characterized by limited resources and are optimized for specific applications. A rising number of battery powered applications has driven a trend towards increased energy efficiency sometimes even traded with performance. Particularly, lower power and low specification embedded processors lack on-chip cache memories. This is mainly in order to avoid the higher ene...

متن کامل

A Statistical Model for Higher Order DPA on Masked Devices

A popular effective countermeasure to protect block cipher implementations against differential power analysis (DPA) attacks is to mask the internal operations of the cryptographic algorithm with random numbers. While the masking technique resists against first-order (univariate) DPA attacks, higher-order (multivariate) attacks were able to break masked devices. In this paper, we formulate a st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004