Cryptographic Coprocessor with Modular Architecture for Research and Development of Countermeasures Against Power-Based Side-Channel Attacks
Mateusz Korona , Tomasz Piotr Wojciechowski , Mariusz Rawski , Paweł Tomaszewicz
AbstractIn modern information processing systems, ensuring confidentiality and secure data transmission is an extremely important issue. However, even the most secure cryptographic algorithm may be insufficient, if its implementation does not take into account the threat of information leak through side-channels. Performing an attack on an unsecured device can be very simple and may not require expensive hardware. For this reason research and development of countermeasures against such attacks is very important. This paper presents an environment designed to facilitate research, development and evaluation of countermeasures protecting hardware implementation of cryptographic primitives against side-channel attacks based on power consumption analysis. The environment is composed of hardware cryptographic coprocessor with modular architecture, data transfer and configuration layers and software testbench for design verification. Different crypto primitives (block ciphers, hash functions, checksum) were implemented along with basic countermeasures. Utilized methods of power consumption approximation are also described. Evaluation of capabilities of the entire environment prove that both, hardware architecture and testbench provide easily extensible and versatile framework for research and development of countermeasures against power-based side-channel attacks.
|Publication size in sheets||0.5|
|Book||Napieralski Andrzej (eds.): Proceedings of 26th International Conference Mixed Design of Integrated Circuits and Systems MIXDES 2019, vol. CFP19MIX-CDR, 2019, Wólczańska 221/223, 90-924 Łódź, Poland, Institute of Electrical and Electronics Engineers, Lodz University of Technology, Department of Microelectronics and Computer Science, ISBN 978-83-63578-15-2, 440 p.|
|Keywords in English||cryptanalysis, differential power analysis, side-channel attacks|
|Score||= 20.0, 22-06-2020, ChapterFromConference|
|Publication indicators||= 0|
* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.