Design and evaluation of a network-based architecture for cryptographic devices
This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a netwo...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 201 |
---|---|
container_issue | |
container_start_page | 191 |
container_title | |
container_volume | |
creator | Dilparic, L. Arvind, D.K. |
description | This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture. |
doi_str_mv | 10.1109/ASAP.2004.1342470 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1342470</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1342470</ieee_id><sourcerecordid>1342470</sourcerecordid><originalsourceid>FETCH-ieee_primary_13424703</originalsourceid><addsrcrecordid>eNp9zr1uwjAUQGGLglQoPADqcl8g4dr5IyNqi7qB1A7dootzkxhoHNmGirfvgjp2OsO3HCGWEmMpsVxtPjb7WCGmsUxSlRY4ElMlc4wwU18PYlEWayzyMlNK5dn4z6R8FDPvj4hJnq6Lqdi9sjdtD9TXwFc6XygY24NtgKDn8GPdKTqQ5xrI6c4E1uHiGBrrQLvbEGzraOiMhpqvRrOfi0lDZ8-Le5_E8_bt8-U9MsxcDc58k7tV9-fkf_0FJhlChw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Design and evaluation of a network-based architecture for cryptographic devices</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Dilparic, L. ; Arvind, D.K.</creator><creatorcontrib>Dilparic, L. ; Arvind, D.K.</creatorcontrib><description>This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.</description><identifier>ISSN: 2160-0511</identifier><identifier>ISBN: 9780769522265</identifier><identifier>ISBN: 0769522262</identifier><identifier>EISSN: 2160-052X</identifier><identifier>DOI: 10.1109/ASAP.2004.1342470</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Cryptography ; Data security ; Decorrelation ; Degradation ; Energy consumption ; Informatics ; Noise robustness ; Power measurement ; Power system security</subject><ispartof>Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004, 2004, p.191-201</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1342470$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1342470$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dilparic, L.</creatorcontrib><creatorcontrib>Arvind, D.K.</creatorcontrib><title>Design and evaluation of a network-based architecture for cryptographic devices</title><title>Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004</title><addtitle>ASAP</addtitle><description>This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.</description><subject>Analytical models</subject><subject>Cryptography</subject><subject>Data security</subject><subject>Decorrelation</subject><subject>Degradation</subject><subject>Energy consumption</subject><subject>Informatics</subject><subject>Noise robustness</subject><subject>Power measurement</subject><subject>Power system security</subject><issn>2160-0511</issn><issn>2160-052X</issn><isbn>9780769522265</isbn><isbn>0769522262</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9zr1uwjAUQGGLglQoPADqcl8g4dr5IyNqi7qB1A7dootzkxhoHNmGirfvgjp2OsO3HCGWEmMpsVxtPjb7WCGmsUxSlRY4ElMlc4wwU18PYlEWayzyMlNK5dn4z6R8FDPvj4hJnq6Lqdi9sjdtD9TXwFc6XygY24NtgKDn8GPdKTqQ5xrI6c4E1uHiGBrrQLvbEGzraOiMhpqvRrOfi0lDZ8-Le5_E8_bt8-U9MsxcDc58k7tV9-fkf_0FJhlChw</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Dilparic, L.</creator><creator>Arvind, D.K.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Design and evaluation of a network-based architecture for cryptographic devices</title><author>Dilparic, L. ; Arvind, D.K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_13424703</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Analytical models</topic><topic>Cryptography</topic><topic>Data security</topic><topic>Decorrelation</topic><topic>Degradation</topic><topic>Energy consumption</topic><topic>Informatics</topic><topic>Noise robustness</topic><topic>Power measurement</topic><topic>Power system security</topic><toplevel>online_resources</toplevel><creatorcontrib>Dilparic, L.</creatorcontrib><creatorcontrib>Arvind, D.K.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dilparic, L.</au><au>Arvind, D.K.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Design and evaluation of a network-based architecture for cryptographic devices</atitle><btitle>Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004</btitle><stitle>ASAP</stitle><date>2004</date><risdate>2004</risdate><spage>191</spage><epage>201</epage><pages>191-201</pages><issn>2160-0511</issn><eissn>2160-052X</eissn><isbn>9780769522265</isbn><isbn>0769522262</isbn><abstract>This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.</abstract><pub>IEEE</pub><doi>10.1109/ASAP.2004.1342470</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2160-0511 |
ispartof | Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004, 2004, p.191-201 |
issn | 2160-0511 2160-052X |
language | eng |
recordid | cdi_ieee_primary_1342470 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Analytical models Cryptography Data security Decorrelation Degradation Energy consumption Informatics Noise robustness Power measurement Power system security |
title | Design and evaluation of a network-based architecture for cryptographic devices |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T10%3A13%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Design%20and%20evaluation%20of%20a%20network-based%20architecture%20for%20cryptographic%20devices&rft.btitle=Proceedings.%2015th%20IEEE%20International%20Conference%20on%20Application-Specific%20Systems,%20Architectures%20and%20Processors,%202004&rft.au=Dilparic,%20L.&rft.date=2004&rft.spage=191&rft.epage=201&rft.pages=191-201&rft.issn=2160-0511&rft.eissn=2160-052X&rft.isbn=9780769522265&rft.isbn_list=0769522262&rft_id=info:doi/10.1109/ASAP.2004.1342470&rft_dat=%3Cieee_6IE%3E1342470%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1342470&rfr_iscdi=true |