Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines
Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the tem...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Kuan Jen Lin Chih Ping Weng |
description | Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the AES encryption algorithm was implemented and the function was successfully verified. |
doi_str_mv | 10.1109/MWSCAS.2011.6026597 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6026597</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6026597</ieee_id><sourcerecordid>6026597</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-a3fa71a264cea75eb8213cc0abfab27465119c8bcaea40a93e11af9d8e81c1533</originalsourceid><addsrcrecordid>eNo1kF1LwzAYheMXuM39gt3kD3TmTZomuSx1fsBEcYqX4218K5ldW9oo7t87cV6dAw88HA5jMxBzAOEu719XRb6aSwEwz4TMtDNHbAwZSJtabfQxG4HWNlHWuRM2dcb-s0yd_rJ0z0yanbPxMGyEkMqAG7GnxXdXtyGG5p1H2nZtj3WyCTFSz2PLffvZ7Cv6yK8ec44xov8YeGj4F_YBy5qSGiM1fse70FEdGhou2FmF9UDTQ07Yy_XiubhNlg83d0W-TAIYHRNUFRpAmaWe0GgqrQTlvcCywlLul2oA523pkTAV6BQBYOXeLFnwoJWasNmfNxDRuuvDFvvd-vCN-gFyhVY2</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kuan Jen Lin ; Chih Ping Weng</creator><creatorcontrib>Kuan Jen Lin ; Chih Ping Weng</creatorcontrib><description>Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the AES encryption algorithm was implemented and the function was successfully verified.</description><identifier>ISSN: 1548-3746</identifier><identifier>ISBN: 9781612848563</identifier><identifier>ISBN: 1612848567</identifier><identifier>EISSN: 1558-3899</identifier><identifier>EISBN: 1612848575</identifier><identifier>EISBN: 9781612848570</identifier><identifier>EISBN: 9781612848556</identifier><identifier>EISBN: 1612848559</identifier><identifier>DOI: 10.1109/MWSCAS.2011.6026597</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cryptography</subject><ispartof>2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), 2011, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6026597$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6026597$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kuan Jen Lin</creatorcontrib><creatorcontrib>Chih Ping Weng</creatorcontrib><title>Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines</title><title>2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS)</title><addtitle>MWSCAS</addtitle><description>Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the AES encryption algorithm was implemented and the function was successfully verified.</description><subject>Cryptography</subject><issn>1548-3746</issn><issn>1558-3899</issn><isbn>9781612848563</isbn><isbn>1612848567</isbn><isbn>1612848575</isbn><isbn>9781612848570</isbn><isbn>9781612848556</isbn><isbn>1612848559</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kF1LwzAYheMXuM39gt3kD3TmTZomuSx1fsBEcYqX4218K5ldW9oo7t87cV6dAw88HA5jMxBzAOEu719XRb6aSwEwz4TMtDNHbAwZSJtabfQxG4HWNlHWuRM2dcb-s0yd_rJ0z0yanbPxMGyEkMqAG7GnxXdXtyGG5p1H2nZtj3WyCTFSz2PLffvZ7Cv6yK8ec44xov8YeGj4F_YBy5qSGiM1fse70FEdGhou2FmF9UDTQ07Yy_XiubhNlg83d0W-TAIYHRNUFRpAmaWe0GgqrQTlvcCywlLul2oA523pkTAV6BQBYOXeLFnwoJWasNmfNxDRuuvDFvvd-vCN-gFyhVY2</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Kuan Jen Lin</creator><creator>Chih Ping Weng</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201108</creationdate><title>Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines</title><author>Kuan Jen Lin ; Chih Ping Weng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-a3fa71a264cea75eb8213cc0abfab27465119c8bcaea40a93e11af9d8e81c1533</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Cryptography</topic><toplevel>online_resources</toplevel><creatorcontrib>Kuan Jen Lin</creatorcontrib><creatorcontrib>Chih Ping Weng</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kuan Jen Lin</au><au>Chih Ping Weng</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines</atitle><btitle>2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS)</btitle><stitle>MWSCAS</stitle><date>2011-08</date><risdate>2011</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><issn>1548-3746</issn><eissn>1558-3899</eissn><isbn>9781612848563</isbn><isbn>1612848567</isbn><eisbn>1612848575</eisbn><eisbn>9781612848570</eisbn><eisbn>9781612848556</eisbn><eisbn>1612848559</eisbn><abstract>Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the AES encryption algorithm was implemented and the function was successfully verified.</abstract><pub>IEEE</pub><doi>10.1109/MWSCAS.2011.6026597</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1548-3746 |
ispartof | 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), 2011, p.1-4 |
issn | 1548-3746 1558-3899 |
language | eng |
recordid | cdi_ieee_primary_6026597 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Cryptography |
title | Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T05%3A41%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Exploiting%20temporal-jitter%20to%20counteract%20DPA%20attacks%20in%20variable-latency%20pipelines&rft.btitle=2011%20IEEE%2054th%20International%20Midwest%20Symposium%20on%20Circuits%20and%20Systems%20(MWSCAS)&rft.au=Kuan%20Jen%20Lin&rft.date=2011-08&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.issn=1548-3746&rft.eissn=1558-3899&rft.isbn=9781612848563&rft.isbn_list=1612848567&rft_id=info:doi/10.1109/MWSCAS.2011.6026597&rft_dat=%3Cieee_6IE%3E6026597%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1612848575&rft.eisbn_list=9781612848570&rft.eisbn_list=9781612848556&rft.eisbn_list=1612848559&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6026597&rfr_iscdi=true |