Title :
Constructive side-channel analysis for secure hardware design
Author :
Herrmann, A. ; Stottinger, M.
Author_Institution :
Temasek Labs., Nanyang Technol. Univ., Singapore, Singapore
Abstract :
Side-channel analysis has become a standard procedure for designing and implementing secure cryptographic primitives of embedded information technology based security systems. In this paper we introduce and discuss the usage of so-called constructive side-channel analysis to optimise the implementation process of secure cryptographic primitives with respect to implementation attacks such as side-channel analysis attacks. Next to an introduction to side-channel aware implementation primitives for security applications, we will highlight the differences between qualitative and quantitative side-channel analysis methods and suitable side-channel analysis tools, which can be utilised for an efficient implementation procedure of secure hardware designs.
Keywords :
cryptography; embedded systems; constructive side-channel analysis attacks; embedded information technology based security systems; implementation attacks; qualitative side-channel analysis method; quantitative side-channel analysis method; secure cryptographic primitives; secure hardware design; Analytical models; Correlation; Cryptography; Integrated circuit modeling; Power demand; Stochastic processes;
Conference_Titel :
Integrated Circuits (ISIC), 2014 14th International Symposium on
Conference_Location :
Singapore
DOI :
10.1109/ISICIR.2014.7029537