DocumentCode :
465247
Title :
Side-Channel Attack Pitfalls
Author :
Tiri, Kris
Author_Institution :
Intel Corp., Santa Clara
fYear :
2007
fDate :
4-8 June 2007
Firstpage :
15
Lastpage :
20
Abstract :
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption or the execution time variations of the device in normal operation mode. The power traces of 8000 encryptions are for instance sufficient to extract the secret key of an unprotected ASIC AES implementation, which is orders of magnitude smaller than the 2128 tests required to brute force the algorithm. A careful implementation can address these vulnerabilities, yet the solutions conflict with the common design goals to optimize for area, performance and power consumption. This paper introduces the side-channel attack pitfalls, which help create or facilitate the observation of the information leakage, discusses mitigation strategies and identifies opportunities for future research.
Keywords :
cryptography; cryptographic algorithms; information leakage; side-channel attack pitfalls; Computer architecture; Data security; Delay effects; Design optimization; Energy consumption; Hardware; Permission; Public key; Public key cryptography; Software algorithms; Design; Differential Power Analysis; Encryption; Security; Security IC; Side-Channel Attack; Verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design Automation Conference, 2007. DAC '07. 44th ACM/IEEE
Conference_Location :
San Diego, CA
ISSN :
0738-100X
Print_ISBN :
978-1-59593-627-1
Type :
conf
Filename :
4261135
Link To Document :
بازگشت