评估加密模块侧信道攻击脆弱性的评估板需求研究

K. Iokibe, Tomonobu Kan, Y. Toyota
{"title":"评估加密模块侧信道攻击脆弱性的评估板需求研究","authors":"K. Iokibe, Tomonobu Kan, Y. Toyota","doi":"10.1109/EMCSI38923.2020.9191655","DOIUrl":null,"url":null,"abstract":"We studied for specifying requirements for side-channel attack (SCA) vulnerability evaluation boards. SCAs are a potential threat to cryptographic modules mounted in electronics products. Cryptographic modules are required to be evaluated in terms of vulnerability by using a test board. However, no reasonable requirements for such test boards have been specified. In this paper, we investigated the signal-to-noise ratio (SNR) of side-channel leakage and the transfer impedance from the side-channel leakage source to an observation port where side-channel leakage is probed in an evaluation board. We examined two models of existing SCA vulnerability evaluation boards that implemented the Advanced Encryption Standard (AES). Results suggest that cryptographic modules need to provide SNRs of side-channel leakage greater than 2 dB for implementations of the cryptographic algorithm involving no SCA countermeasures. It is also inferred that the transfer impedance needs to satisfy two conflicting requirements. The transfer impedance should be as large as possible, considering the ease of evaluation. At the same time, the transfer impedance needs to be low enough to suppress fluctuations in the power supply voltage and guarantee evaluation in a state equivalent to the actual operating state of the IC. Coaxial connectors would be recommended to be implemented for increasing the SNR and for reproducibility of measurements.","PeriodicalId":189322,"journal":{"name":"2020 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Study on Evaluation Board Requirements for Assessing Vulnerability of Cryptographic Modules to Side-Channel Attacks\",\"authors\":\"K. Iokibe, Tomonobu Kan, Y. Toyota\",\"doi\":\"10.1109/EMCSI38923.2020.9191655\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We studied for specifying requirements for side-channel attack (SCA) vulnerability evaluation boards. SCAs are a potential threat to cryptographic modules mounted in electronics products. Cryptographic modules are required to be evaluated in terms of vulnerability by using a test board. However, no reasonable requirements for such test boards have been specified. In this paper, we investigated the signal-to-noise ratio (SNR) of side-channel leakage and the transfer impedance from the side-channel leakage source to an observation port where side-channel leakage is probed in an evaluation board. We examined two models of existing SCA vulnerability evaluation boards that implemented the Advanced Encryption Standard (AES). Results suggest that cryptographic modules need to provide SNRs of side-channel leakage greater than 2 dB for implementations of the cryptographic algorithm involving no SCA countermeasures. It is also inferred that the transfer impedance needs to satisfy two conflicting requirements. The transfer impedance should be as large as possible, considering the ease of evaluation. At the same time, the transfer impedance needs to be low enough to suppress fluctuations in the power supply voltage and guarantee evaluation in a state equivalent to the actual operating state of the IC. Coaxial connectors would be recommended to be implemented for increasing the SNR and for reproducibility of measurements.\",\"PeriodicalId\":189322,\"journal\":{\"name\":\"2020 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EMCSI38923.2020.9191655\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EMCSI38923.2020.9191655","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

针对侧信道攻击(SCA)漏洞评估板的需求进行了研究。sca对安装在电子产品中的加密模块是一个潜在的威胁。需要使用测试板对加密模块进行脆弱性评估。但是,对这种测试板没有规定合理的要求。本文研究了旁道泄漏的信噪比(SNR),以及从旁道泄漏源到探测旁道泄漏的观测口的传输阻抗。我们检查了实现高级加密标准(AES)的现有SCA漏洞评估板的两种模型。结果表明,为了实现不涉及SCA对策的加密算法,加密模块需要提供大于2 dB的侧信道泄漏信噪比。由此还可以推断,传递阻抗需要满足两个相互冲突的要求。考虑到评估的便利性,传递阻抗应尽可能大。同时,传输阻抗需要足够低,以抑制电源电压的波动,并保证评估处于与IC实际工作状态相当的状态。建议采用同轴连接器,以提高信噪比和测量的可重复性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Study on Evaluation Board Requirements for Assessing Vulnerability of Cryptographic Modules to Side-Channel Attacks
We studied for specifying requirements for side-channel attack (SCA) vulnerability evaluation boards. SCAs are a potential threat to cryptographic modules mounted in electronics products. Cryptographic modules are required to be evaluated in terms of vulnerability by using a test board. However, no reasonable requirements for such test boards have been specified. In this paper, we investigated the signal-to-noise ratio (SNR) of side-channel leakage and the transfer impedance from the side-channel leakage source to an observation port where side-channel leakage is probed in an evaluation board. We examined two models of existing SCA vulnerability evaluation boards that implemented the Advanced Encryption Standard (AES). Results suggest that cryptographic modules need to provide SNRs of side-channel leakage greater than 2 dB for implementations of the cryptographic algorithm involving no SCA countermeasures. It is also inferred that the transfer impedance needs to satisfy two conflicting requirements. The transfer impedance should be as large as possible, considering the ease of evaluation. At the same time, the transfer impedance needs to be low enough to suppress fluctuations in the power supply voltage and guarantee evaluation in a state equivalent to the actual operating state of the IC. Coaxial connectors would be recommended to be implemented for increasing the SNR and for reproducibility of measurements.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信