Title :
Towards secure cryptographic software implementation against side-channel power analysis attacks
Author :
Luo, Pei ; Zhang, Liwei ; Fei, Yunsi ; Ding, A.Adam
Author_Institution :
Electrical & Computer Engineering Department, Northeastern University, Boston, MA 02115 USA
Abstract :
Side-channel attacks have been a real threat against many embedded cryptographic systems. A commonly used algorithmic countermeasure, random masking, incurs large execution delay and resource overhead. The other countermeasure, operation shuffling or permutation, can mitigate side-channel leakage effectively with minimal overhead. In this paper, we target automatically implementing operation shuffling in cryptographic algorithms to resist against side-channel power analysis attacks. We design a tool to detect independence among statements at the source code level and devise an algorithm for automatic operation shuffling. We test our algorithm on the new SHA3 standard, Keccak. Results show that the tool effectively implements operation-shuffling to reduce the side-channel leakage significantly, and therefore can guide automatic secure cryptographic software implementations against differential power analysis attacks.
Keywords :
Algorithm design and analysis; Arrays; Correlation; Cryptography; Software; Software algorithms; Space exploration; Keccak; Side-channel attacks; shuffling;
Conference_Titel :
Application-specific Systems, Architectures and Processors (ASAP), 2015 IEEE 26th International Conference on
Conference_Location :
Toronto, ON, Canada
DOI :
10.1109/ASAP.2015.7245722