Mateusz Korona, T. Wojciechowski, M. Rawski, P. Tomaszewicz
{"title":"基于模块化结构的密码协处理器研究与开发基于功率的侧信道攻击对策","authors":"Mateusz Korona, T. Wojciechowski, M. Rawski, P. Tomaszewicz","doi":"10.23919/MIXDES.2019.8787062","DOIUrl":null,"url":null,"abstract":"In modern information processing systems, ensuring confidentiality and secure data transmission is an extremely important issue. However, even the most secure cryptographic algorithm may be insufficient, if its implementation does not take into account the threat of information leak through side-channels. Performing an attack on an unsecured device can be very simple and may not require expensive hardware. For this reason research and development of countermeasures against such attacks is very important.This paper presents an environment designed to facilitate research, development and evaluation of countermeasures protecting hardware implementation of cryptographic primitives against side-channel attacks based on power consumption analysis.The environment is composed of hardware cryptographic coprocessor with modular architecture, data transfer and configuration layers and software testbench for design verification. Different crypto primitives (block ciphers, hash functions, checksum) were implemented along with basic countermeasures. Utilized methods of power consumption approximation are also described.Evaluation of capabilities of the entire environment prove that both, hardware architecture and testbench provide easily extensible and versatile framework for research and development of countermeasures against power-based side-channel attacks.","PeriodicalId":309822,"journal":{"name":"2019 MIXDES - 26th International Conference \"Mixed Design of Integrated Circuits and Systems\"","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cryptographic Coprocessor with Modular Architecture for Research and Development of Countermeasures Against Power-Based Side-Channel Attacks\",\"authors\":\"Mateusz Korona, T. Wojciechowski, M. Rawski, P. Tomaszewicz\",\"doi\":\"10.23919/MIXDES.2019.8787062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In modern information processing systems, ensuring confidentiality and secure data transmission is an extremely important issue. However, even the most secure cryptographic algorithm may be insufficient, if its implementation does not take into account the threat of information leak through side-channels. Performing an attack on an unsecured device can be very simple and may not require expensive hardware. For this reason research and development of countermeasures against such attacks is very important.This paper presents an environment designed to facilitate research, development and evaluation of countermeasures protecting hardware implementation of cryptographic primitives against side-channel attacks based on power consumption analysis.The environment is composed of hardware cryptographic coprocessor with modular architecture, data transfer and configuration layers and software testbench for design verification. Different crypto primitives (block ciphers, hash functions, checksum) were implemented along with basic countermeasures. Utilized methods of power consumption approximation are also described.Evaluation of capabilities of the entire environment prove that both, hardware architecture and testbench provide easily extensible and versatile framework for research and development of countermeasures against power-based side-channel attacks.\",\"PeriodicalId\":309822,\"journal\":{\"name\":\"2019 MIXDES - 26th International Conference \\\"Mixed Design of Integrated Circuits and Systems\\\"\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 MIXDES - 26th International Conference \\\"Mixed Design of Integrated Circuits and Systems\\\"\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/MIXDES.2019.8787062\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 MIXDES - 26th International Conference \"Mixed Design of Integrated Circuits and Systems\"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/MIXDES.2019.8787062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptographic Coprocessor with Modular Architecture for Research and Development of Countermeasures Against Power-Based Side-Channel Attacks
In modern information processing systems, ensuring confidentiality and secure data transmission is an extremely important issue. However, even the most secure cryptographic algorithm may be insufficient, if its implementation does not take into account the threat of information leak through side-channels. Performing an attack on an unsecured device can be very simple and may not require expensive hardware. For this reason research and development of countermeasures against such attacks is very important.This paper presents an environment designed to facilitate research, development and evaluation of countermeasures protecting hardware implementation of cryptographic primitives against side-channel attacks based on power consumption analysis.The environment is composed of hardware cryptographic coprocessor with modular architecture, data transfer and configuration layers and software testbench for design verification. Different crypto primitives (block ciphers, hash functions, checksum) were implemented along with basic countermeasures. Utilized methods of power consumption approximation are also described.Evaluation of capabilities of the entire environment prove that both, hardware architecture and testbench provide easily extensible and versatile framework for research and development of countermeasures against power-based side-channel attacks.