Farshideh Kordi, Hamed Hossein-Talaee, A. Jahanian
{"title":"抗模板侧信道攻击的经济实用对策","authors":"Farshideh Kordi, Hamed Hossein-Talaee, A. Jahanian","doi":"10.1109/ISCISC51277.2020.9261918","DOIUrl":null,"url":null,"abstract":"One of the most efficient attacks for exploiting the secret key is a template attack. Recent researches show that regular countermeasures against these attacks are costly. Randomized shuffling in the time domain is known as a cost-effective countermeasures against side-channel attacks are widely used. In this article, we implemented a real template attack and proposed an efficient countermeasure against it. We practically evaluated security improvement with this method in the AES algorithm on a template attack and reported the analysis results of our countermeasure. According to these results, template attack will be hardened significantly after the proposed protection such that the grade of the key recovery increases from 1 with 350K traces in unprotected design to 2100 with 700K traces in the protected circuit. This security improvement gains in the cost of about 7% delay overhead.","PeriodicalId":206256,"journal":{"name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cost-Effective and Practical Countermeasure against the Template Side Channel Attack\",\"authors\":\"Farshideh Kordi, Hamed Hossein-Talaee, A. Jahanian\",\"doi\":\"10.1109/ISCISC51277.2020.9261918\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most efficient attacks for exploiting the secret key is a template attack. Recent researches show that regular countermeasures against these attacks are costly. Randomized shuffling in the time domain is known as a cost-effective countermeasures against side-channel attacks are widely used. In this article, we implemented a real template attack and proposed an efficient countermeasure against it. We practically evaluated security improvement with this method in the AES algorithm on a template attack and reported the analysis results of our countermeasure. According to these results, template attack will be hardened significantly after the proposed protection such that the grade of the key recovery increases from 1 with 350K traces in unprotected design to 2100 with 700K traces in the protected circuit. This security improvement gains in the cost of about 7% delay overhead.\",\"PeriodicalId\":206256,\"journal\":{\"name\":\"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"volume\":\"97 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCISC51277.2020.9261918\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC51277.2020.9261918","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cost-Effective and Practical Countermeasure against the Template Side Channel Attack
One of the most efficient attacks for exploiting the secret key is a template attack. Recent researches show that regular countermeasures against these attacks are costly. Randomized shuffling in the time domain is known as a cost-effective countermeasures against side-channel attacks are widely used. In this article, we implemented a real template attack and proposed an efficient countermeasure against it. We practically evaluated security improvement with this method in the AES algorithm on a template attack and reported the analysis results of our countermeasure. According to these results, template attack will be hardened significantly after the proposed protection such that the grade of the key recovery increases from 1 with 350K traces in unprotected design to 2100 with 700K traces in the protected circuit. This security improvement gains in the cost of about 7% delay overhead.