The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe. Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices. Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations. This paper deals with the leakage that occurs in the SW computation of AES on platforms equipepd with a cache memory through the miss events, which may allow to infer the secret key.

A power attack methodology to AES based on induced cache misses: procedure, evaluation and possible countermeasures

BERTONI, GUIDO MARCO;BREVEGLIERI, LUCA ODDONE;MONCHIERO, MATTEO;PALERMO, GIANLUCA;ZACCARIA, VITTORIO
2006-01-01

Abstract

The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe. Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices. Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations. This paper deals with the leakage that occurs in the SW computation of AES on platforms equipepd with a cache memory through the miss events, which may allow to infer the secret key.
New Trends in Cryptographic Systems
159454977X
9781594549779
File in questo prodotto:
File Dimensione Formato  
L2.pdf

Accesso riservato

: Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione 8.4 MB
Formato Adobe PDF
8.4 MB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11311/553409
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact