کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
6885789 1444579 2018 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Reactive side-channel countermeasures: Applicability and quantitative security evaluation
ترجمه فارسی عنوان
مقابله با واکنش های جانبی کانال: کاربرد پذیری و ارزیابی امنیتی کمی
کلمات کلیدی
رمزنگاری کاربردی امنیت سیستم جاسازی شده، امنیت رایانه، برنامه مبارزه با خودکار، اقدامات ضد واکنشی،
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی
The security of cryptographic implementations running on embedded systems is threatened by side-channel attacks. Such attacks retrieve a secret key from a computing device observing the information leaking on unintended channels such as the energy consumed during a computation. The vast majority of the countermeasures proposed against such attacks aims at preventing the attacker from exploiting fruitfully the information leaking on the side-channel either altering it or hiding it within a higher noise envelope. Whilst all these countermeasures provide a quantitative security margin against an attacker, they do not provide an indication of having been successfully overcome, thus forsaking the possibility of taking a reactive action upon an eventual security breach. In an effort to propose a reactive countermeasure, we describe our proposal suggesting the introduction of redundant computations employing fixed fake keys (a.k.a. chaffs) to pollute the leaked information with plausible albeit deceitful one. We provide an in depth analysis of the proposed approach, highlighting the constraints to its effective applicability, and the boundary conditions which allow its employment for the securization of a system. We detail the attacker model considered, and the reactive security margin provided by the proposed scheme, highlighting the extent of the realizability of a reactive countermeasure, given the nature of the side-channel information. To provide experimental backing to our analysis, effectiveness and efficiency results on the Advanced Encryption Standard (AES) cipher implementation as well as lightweight block ciphers implementations running on an ARM Cortex-M4 processor are shown.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Microprocessors and Microsystems - Volume 62, October 2018, Pages 50-60
نویسندگان
, , , ,