DocumentCode
2215980
Title
Instruction stream mutation for non-deterministic processors
Author
Irwin, J. ; Page, D. ; Smart, N.P.
Author_Institution
Dept. of Comput. Sci., Bristol Univ., UK
fYear
2002
fDate
2002
Firstpage
286
Lastpage
295
Abstract
Differential power analysis (DPA) has become a real-world threat to the security of cryptographic hardware devices such as smart-cards. By using cheap and readily available equipment, attacks can easily compromise algorithms running on these devices in a non-invasive manner. Adding non-determinism to the execution of cryptographic algorithms has been proposed as a defence against these attacks. One way of achieving this non-determinism is to introduce random additional operations to the algorithm which produce noise in the power profile of the device. We describe the addition of a specialised processor pipeline stage which increases the level of potential non-determinism and hence guards against the revelation of secret information.
Keywords
computer crime; integrated circuit design; integrated circuit modelling; integrated circuit noise; microprocessor chips; pipeline processing; public key cryptography; randomised algorithms; smart cards; DPA security threat; cryptographic algorithm execution; cryptographic hardware devices; device power profile noise production; differential power analysis; nondeterministic processor instruction stream mutation; noninvasive security attack defence; potential nondeterminism level increase; processor pipeline stage; random additional operations; running algorithm analysis; secret information guard; smart-cards; Computer science; Computer security; Costs; Cryptography; Genetic mutations; Hardware; Pipelines; Power measurement; Registers; Runtime;
fLanguage
English
Publisher
ieee
Conference_Titel
Application-Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE International Conference on
ISSN
2160-0511
Print_ISBN
0-7695-1712-9
Type
conf
DOI
10.1109/ASAP.2002.1030727
Filename
1030727
Link To Document