Design and evaluation of a network-based architecture for cryptographic devices

This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a netwo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Dilparic, L., Arvind, D.K.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 201
container_issue
container_start_page 191
container_title
container_volume
creator Dilparic, L.
Arvind, D.K.
description This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.
doi_str_mv 10.1109/ASAP.2004.1342470
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1342470</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1342470</ieee_id><sourcerecordid>1342470</sourcerecordid><originalsourceid>FETCH-ieee_primary_13424703</originalsourceid><addsrcrecordid>eNp9zr1uwjAUQGGLglQoPADqcl8g4dr5IyNqi7qB1A7dootzkxhoHNmGirfvgjp2OsO3HCGWEmMpsVxtPjb7WCGmsUxSlRY4ElMlc4wwU18PYlEWayzyMlNK5dn4z6R8FDPvj4hJnq6Lqdi9sjdtD9TXwFc6XygY24NtgKDn8GPdKTqQ5xrI6c4E1uHiGBrrQLvbEGzraOiMhpqvRrOfi0lDZ8-Le5_E8_bt8-U9MsxcDc58k7tV9-fkf_0FJhlChw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Design and evaluation of a network-based architecture for cryptographic devices</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Dilparic, L. ; Arvind, D.K.</creator><creatorcontrib>Dilparic, L. ; Arvind, D.K.</creatorcontrib><description>This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.</description><identifier>ISSN: 2160-0511</identifier><identifier>ISBN: 9780769522265</identifier><identifier>ISBN: 0769522262</identifier><identifier>EISSN: 2160-052X</identifier><identifier>DOI: 10.1109/ASAP.2004.1342470</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Cryptography ; Data security ; Decorrelation ; Degradation ; Energy consumption ; Informatics ; Noise robustness ; Power measurement ; Power system security</subject><ispartof>Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004, 2004, p.191-201</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1342470$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1342470$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dilparic, L.</creatorcontrib><creatorcontrib>Arvind, D.K.</creatorcontrib><title>Design and evaluation of a network-based architecture for cryptographic devices</title><title>Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004</title><addtitle>ASAP</addtitle><description>This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.</description><subject>Analytical models</subject><subject>Cryptography</subject><subject>Data security</subject><subject>Decorrelation</subject><subject>Degradation</subject><subject>Energy consumption</subject><subject>Informatics</subject><subject>Noise robustness</subject><subject>Power measurement</subject><subject>Power system security</subject><issn>2160-0511</issn><issn>2160-052X</issn><isbn>9780769522265</isbn><isbn>0769522262</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9zr1uwjAUQGGLglQoPADqcl8g4dr5IyNqi7qB1A7dootzkxhoHNmGirfvgjp2OsO3HCGWEmMpsVxtPjb7WCGmsUxSlRY4ElMlc4wwU18PYlEWayzyMlNK5dn4z6R8FDPvj4hJnq6Lqdi9sjdtD9TXwFc6XygY24NtgKDn8GPdKTqQ5xrI6c4E1uHiGBrrQLvbEGzraOiMhpqvRrOfi0lDZ8-Le5_E8_bt8-U9MsxcDc58k7tV9-fkf_0FJhlChw</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Dilparic, L.</creator><creator>Arvind, D.K.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Design and evaluation of a network-based architecture for cryptographic devices</title><author>Dilparic, L. ; Arvind, D.K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_13424703</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Analytical models</topic><topic>Cryptography</topic><topic>Data security</topic><topic>Decorrelation</topic><topic>Degradation</topic><topic>Energy consumption</topic><topic>Informatics</topic><topic>Noise robustness</topic><topic>Power measurement</topic><topic>Power system security</topic><toplevel>online_resources</toplevel><creatorcontrib>Dilparic, L.</creatorcontrib><creatorcontrib>Arvind, D.K.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dilparic, L.</au><au>Arvind, D.K.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Design and evaluation of a network-based architecture for cryptographic devices</atitle><btitle>Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004</btitle><stitle>ASAP</stitle><date>2004</date><risdate>2004</risdate><spage>191</spage><epage>201</epage><pages>191-201</pages><issn>2160-0511</issn><eissn>2160-052X</eissn><isbn>9780769522265</isbn><isbn>0769522262</isbn><abstract>This work presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.</abstract><pub>IEEE</pub><doi>10.1109/ASAP.2004.1342470</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2160-0511
ispartof Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004, 2004, p.191-201
issn 2160-0511
2160-052X
language eng
recordid cdi_ieee_primary_1342470
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Analytical models
Cryptography
Data security
Decorrelation
Degradation
Energy consumption
Informatics
Noise robustness
Power measurement
Power system security
title Design and evaluation of a network-based architecture for cryptographic devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T10%3A13%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Design%20and%20evaluation%20of%20a%20network-based%20architecture%20for%20cryptographic%20devices&rft.btitle=Proceedings.%2015th%20IEEE%20International%20Conference%20on%20Application-Specific%20Systems,%20Architectures%20and%20Processors,%202004&rft.au=Dilparic,%20L.&rft.date=2004&rft.spage=191&rft.epage=201&rft.pages=191-201&rft.issn=2160-0511&rft.eissn=2160-052X&rft.isbn=9780769522265&rft.isbn_list=0769522262&rft_id=info:doi/10.1109/ASAP.2004.1342470&rft_dat=%3Cieee_6IE%3E1342470%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1342470&rfr_iscdi=true