{"title":"局部电磁分析下的变径镜像电路","authors":"Ao Li, Leibo Liu, Bo Wang, Shaojun Wei","doi":"10.1109/iccsn.2018.8488210","DOIUrl":null,"url":null,"abstract":"Local electromagnetic analysis has posed great threat to the security of cryptographic processor. This paper analyzed the mirror circuit characteristic, and find that mirror circuit has location-dependent leakages, two countermeasures named R-Box and upside down network (UDN) are introduced to eliminate location-dependent leakage in mirror circuit. The security of the two countermeasures when machine learning tools are applied will be analyzed.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Path-Changed Mirror Circuit against Local Electromagnetic Analysis\",\"authors\":\"Ao Li, Leibo Liu, Bo Wang, Shaojun Wei\",\"doi\":\"10.1109/iccsn.2018.8488210\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Local electromagnetic analysis has posed great threat to the security of cryptographic processor. This paper analyzed the mirror circuit characteristic, and find that mirror circuit has location-dependent leakages, two countermeasures named R-Box and upside down network (UDN) are introduced to eliminate location-dependent leakage in mirror circuit. The security of the two countermeasures when machine learning tools are applied will be analyzed.\",\"PeriodicalId\":243383,\"journal\":{\"name\":\"2018 10th International Conference on Communication Software and Networks (ICCSN)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 10th International Conference on Communication Software and Networks (ICCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iccsn.2018.8488210\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 10th International Conference on Communication Software and Networks (ICCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccsn.2018.8488210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Path-Changed Mirror Circuit against Local Electromagnetic Analysis
Local electromagnetic analysis has posed great threat to the security of cryptographic processor. This paper analyzed the mirror circuit characteristic, and find that mirror circuit has location-dependent leakages, two countermeasures named R-Box and upside down network (UDN) are introduced to eliminate location-dependent leakage in mirror circuit. The security of the two countermeasures when machine learning tools are applied will be analyzed.