Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines

Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the tem...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kuan Jen Lin, Chih Ping Weng
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4
container_issue
container_start_page 1
container_title
container_volume
creator Kuan Jen Lin
Chih Ping Weng
description Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the AES encryption algorithm was implemented and the function was successfully verified.
doi_str_mv 10.1109/MWSCAS.2011.6026597
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6026597</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6026597</ieee_id><sourcerecordid>6026597</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-a3fa71a264cea75eb8213cc0abfab27465119c8bcaea40a93e11af9d8e81c1533</originalsourceid><addsrcrecordid>eNo1kF1LwzAYheMXuM39gt3kD3TmTZomuSx1fsBEcYqX4218K5ldW9oo7t87cV6dAw88HA5jMxBzAOEu719XRb6aSwEwz4TMtDNHbAwZSJtabfQxG4HWNlHWuRM2dcb-s0yd_rJ0z0yanbPxMGyEkMqAG7GnxXdXtyGG5p1H2nZtj3WyCTFSz2PLffvZ7Cv6yK8ec44xov8YeGj4F_YBy5qSGiM1fse70FEdGhou2FmF9UDTQ07Yy_XiubhNlg83d0W-TAIYHRNUFRpAmaWe0GgqrQTlvcCywlLul2oA523pkTAV6BQBYOXeLFnwoJWasNmfNxDRuuvDFvvd-vCN-gFyhVY2</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kuan Jen Lin ; Chih Ping Weng</creator><creatorcontrib>Kuan Jen Lin ; Chih Ping Weng</creatorcontrib><description>Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the AES encryption algorithm was implemented and the function was successfully verified.</description><identifier>ISSN: 1548-3746</identifier><identifier>ISBN: 9781612848563</identifier><identifier>ISBN: 1612848567</identifier><identifier>EISSN: 1558-3899</identifier><identifier>EISBN: 1612848575</identifier><identifier>EISBN: 9781612848570</identifier><identifier>EISBN: 9781612848556</identifier><identifier>EISBN: 1612848559</identifier><identifier>DOI: 10.1109/MWSCAS.2011.6026597</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cryptography</subject><ispartof>2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), 2011, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6026597$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6026597$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kuan Jen Lin</creatorcontrib><creatorcontrib>Chih Ping Weng</creatorcontrib><title>Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines</title><title>2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS)</title><addtitle>MWSCAS</addtitle><description>Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the AES encryption algorithm was implemented and the function was successfully verified.</description><subject>Cryptography</subject><issn>1548-3746</issn><issn>1558-3899</issn><isbn>9781612848563</isbn><isbn>1612848567</isbn><isbn>1612848575</isbn><isbn>9781612848570</isbn><isbn>9781612848556</isbn><isbn>1612848559</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kF1LwzAYheMXuM39gt3kD3TmTZomuSx1fsBEcYqX4218K5ldW9oo7t87cV6dAw88HA5jMxBzAOEu719XRb6aSwEwz4TMtDNHbAwZSJtabfQxG4HWNlHWuRM2dcb-s0yd_rJ0z0yanbPxMGyEkMqAG7GnxXdXtyGG5p1H2nZtj3WyCTFSz2PLffvZ7Cv6yK8ec44xov8YeGj4F_YBy5qSGiM1fse70FEdGhou2FmF9UDTQ07Yy_XiubhNlg83d0W-TAIYHRNUFRpAmaWe0GgqrQTlvcCywlLul2oA523pkTAV6BQBYOXeLFnwoJWasNmfNxDRuuvDFvvd-vCN-gFyhVY2</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Kuan Jen Lin</creator><creator>Chih Ping Weng</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201108</creationdate><title>Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines</title><author>Kuan Jen Lin ; Chih Ping Weng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-a3fa71a264cea75eb8213cc0abfab27465119c8bcaea40a93e11af9d8e81c1533</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Cryptography</topic><toplevel>online_resources</toplevel><creatorcontrib>Kuan Jen Lin</creatorcontrib><creatorcontrib>Chih Ping Weng</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kuan Jen Lin</au><au>Chih Ping Weng</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines</atitle><btitle>2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS)</btitle><stitle>MWSCAS</stitle><date>2011-08</date><risdate>2011</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><issn>1548-3746</issn><eissn>1558-3899</eissn><isbn>9781612848563</isbn><isbn>1612848567</isbn><eisbn>1612848575</eisbn><eisbn>9781612848570</eisbn><eisbn>9781612848556</eisbn><eisbn>1612848559</eisbn><abstract>Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the AES encryption algorithm was implemented and the function was successfully verified.</abstract><pub>IEEE</pub><doi>10.1109/MWSCAS.2011.6026597</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1548-3746
ispartof 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), 2011, p.1-4
issn 1548-3746
1558-3899
language eng
recordid cdi_ieee_primary_6026597
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Cryptography
title Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T05%3A41%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Exploiting%20temporal-jitter%20to%20counteract%20DPA%20attacks%20in%20variable-latency%20pipelines&rft.btitle=2011%20IEEE%2054th%20International%20Midwest%20Symposium%20on%20Circuits%20and%20Systems%20(MWSCAS)&rft.au=Kuan%20Jen%20Lin&rft.date=2011-08&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.issn=1548-3746&rft.eissn=1558-3899&rft.isbn=9781612848563&rft.isbn_list=1612848567&rft_id=info:doi/10.1109/MWSCAS.2011.6026597&rft_dat=%3Cieee_6IE%3E6026597%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1612848575&rft.eisbn_list=9781612848570&rft.eisbn_list=9781612848556&rft.eisbn_list=1612848559&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6026597&rfr_iscdi=true