Journal of Cryptographic Engineering最新文献

筛选
英文 中文
A critical view on the real-world security of logic locking. 逻辑锁在现实世界中的安全性。
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-01-01 Epub Date: 2022-08-20 DOI: 10.1007/s13389-022-00294-x
Susanne Engels, Max Hoffmann, Christof Paar
{"title":"A critical view on the real-world security of logic locking.","authors":"Susanne Engels,&nbsp;Max Hoffmann,&nbsp;Christof Paar","doi":"10.1007/s13389-022-00294-x","DOIUrl":"https://doi.org/10.1007/s13389-022-00294-x","url":null,"abstract":"<p><p>With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become <i>fabless</i>, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is <i>logic locking</i>, where the genuine functionality of a chip is \"locked\" using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction-a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction.</p>","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 3","pages":"229-244"},"PeriodicalIF":1.9,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9464179/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40358123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving recent side-channel attacks against the DES key schedule 改进了最近针对DES密钥调度的侧信道攻击
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-12-04 DOI: 10.1007/s13389-021-00279-2
A. Wiemers, Johannes Mittmann
{"title":"Improving recent side-channel attacks against the DES key schedule","authors":"A. Wiemers, Johannes Mittmann","doi":"10.1007/s13389-021-00279-2","DOIUrl":"https://doi.org/10.1007/s13389-021-00279-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"1-17"},"PeriodicalIF":1.9,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43803399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications 优化的阈值实现:为低能耗和低延迟应用程序保护加密加速器
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-11-25 DOI: 10.1007/s13389-021-00276-5
Dušan Božilov, Miroslav Knezevic, V. Nikov
{"title":"Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications","authors":"Dušan Božilov, Miroslav Knezevic, V. Nikov","doi":"10.1007/s13389-021-00276-5","DOIUrl":"https://doi.org/10.1007/s13389-021-00276-5","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"15 - 51"},"PeriodicalIF":1.9,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46673530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
In-depth energy analysis of security algorithms and protocols for the Internet of Things 物联网安全算法和协议的深度能量分析
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-11-24 DOI: 10.1007/s13389-021-00274-7
J. Winderickx, An Braeken, Dave Singelée, N. Mentens
{"title":"In-depth energy analysis of security algorithms and protocols for the Internet of Things","authors":"J. Winderickx, An Braeken, Dave Singelée, N. Mentens","doi":"10.1007/s13389-021-00274-7","DOIUrl":"https://doi.org/10.1007/s13389-021-00274-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"137 - 149"},"PeriodicalIF":1.9,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43029428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spatial dependency analysis to extract information from side-channel mixtures: extended version 从侧通道混合物中提取信息的空间相关性分析:扩展版本
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-11-15 DOI: 10.1145/3474376.3487280
Aurélien Vasselle, Hugues Thiebeauld, P. Maurine
{"title":"Spatial dependency analysis to extract information from side-channel mixtures: extended version","authors":"Aurélien Vasselle, Hugues Thiebeauld, P. Maurine","doi":"10.1145/3474376.3487280","DOIUrl":"https://doi.org/10.1145/3474376.3487280","url":null,"abstract":"Practical side-channel attacks on recent devices may be challenging due to the poor quality of acquired signals. It can originate from different factors, such as the growing architecture complexity, especially in System-on-Chips, creating unpredictable and concurrent operation of multiple signal sources in the device. This work makes use of mixture distributions to formalize this complexity, allowing us to explain the benefit of using a technique like Scatter, where different samples of the traces are aggregated into the same distribution. Some observations of the conditional mixture distributions are made in order to model the leakage in such context. From this, we infer local coherency of information held in the distribution as a general expression of the leakage in mixture distributions. This leads us to introduce how spatial analysis tools, such as Moran’s Index, can be used to significantly improve non-profiled attacks compared to other techniques from the state-of-the-art. Exploitation of this technique is experimentally shown very promising, as demonstrated by its application on two AES implementations including masking and shuffling countermeasures.","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-17"},"PeriodicalIF":1.9,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48475659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sycon: a new milestone in designing ASCON-like permutations Sycon:设计ascon类排列的新里程碑
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-10-08 DOI: 10.1007/s13389-021-00272-9
K. Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo
{"title":"Sycon: a new milestone in designing ASCON-like permutations","authors":"K. Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo","doi":"10.1007/s13389-021-00272-9","DOIUrl":"https://doi.org/10.1007/s13389-021-00272-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"305 - 327"},"PeriodicalIF":1.9,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46971729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC 通过现代FPGA-SoC上的恶意硬件打破TrustZone内存隔离和安全启动
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-09-15 DOI: 10.1007/s13389-021-00273-8
Mathieu Gross, Nisha Jacob, A. Zankl, G. Sigl
{"title":"Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC","authors":"Mathieu Gross, Nisha Jacob, A. Zankl, G. Sigl","doi":"10.1007/s13389-021-00273-8","DOIUrl":"https://doi.org/10.1007/s13389-021-00273-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"181 - 196"},"PeriodicalIF":1.9,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44931232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents CSIDH的SQALE:低指数的亚线性vsamulu抗量子等构作用
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-08-31 DOI: 10.1007/s13389-021-00271-w
J. Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, F. Rodríguez-Henríquez
{"title":"The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents","authors":"J. Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, F. Rodríguez-Henríquez","doi":"10.1007/s13389-021-00271-w","DOIUrl":"https://doi.org/10.1007/s13389-021-00271-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"349 - 368"},"PeriodicalIF":1.9,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45485698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
The ASHES 2019 special issue at JCEN ASHES2019 JCEN特刊
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-08-22 DOI: 10.1007/s13389-021-00270-x
Chip-Hong Chang, Daniel E. Holcomb, U. Rührmair, P. Schaumont
{"title":"The ASHES 2019 special issue at JCEN","authors":"Chip-Hong Chang, Daniel E. Holcomb, U. Rührmair, P. Schaumont","doi":"10.1007/s13389-021-00270-x","DOIUrl":"https://doi.org/10.1007/s13389-021-00270-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"199 - 200"},"PeriodicalIF":1.9,"publicationDate":"2021-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00270-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48633854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rank estimation with bounded error via exponential sampling 基于指数抽样的有界误差秩估计
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-08-04 DOI: 10.1007/s13389-021-00269-4
Liron David, A. Wool
{"title":"Rank estimation with bounded error via exponential sampling","authors":"Liron David, A. Wool","doi":"10.1007/s13389-021-00269-4","DOIUrl":"https://doi.org/10.1007/s13389-021-00269-4","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"151 - 168"},"PeriodicalIF":1.9,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48984396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信