Loading…
Tamper Resistance Simulation on Algorithm Level Design
SUMMARY Recently, side‐channel attacks have become a serious problem. These attacks estimate the secret keys of cryptography circuits embedded in hardware. In particular, the most threatening side‐channel attacks are differential power analysis and correlation power analysis, which use the correlati...
Saved in:
Published in: | Electrical engineering in Japan 2014-01, Vol.186 (2), p.40-51 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | SUMMARY
Recently, side‐channel attacks have become a serious problem. These attacks estimate the secret keys of cryptography circuits embedded in hardware. In particular, the most threatening side‐channel attacks are differential power analysis and correlation power analysis, which use the correlation between information processing and power consumption, which are related to secret keys in cryptography circuits. Therefore, new measures are required to prevent confidential information in cryptography circuits from being leaked to side‐channel information, such as power consumption. When designing preventive measures, resistance to side‐channel attacks, for instance tamper resistance, must be evaluated. This study proposes a new simulation method by which tamper resistance can be verified in the algorithm and architecture design phases. Experimental results show the validity of the proposed simulation method. © 2013 Wiley Periodicals, Inc. Electr Eng Jpn, 186(2): 40–51, 2014; Published online in Wiley Online Library (wileyonlinelibrary.com). DOI 10.1002/eej.22342 |
---|---|
ISSN: | 0424-7760 1520-6416 |
DOI: | 10.1002/eej.22342 |