首页 > 最新文献

Proceedings of the Third Workshop on Cryptography and Security in Computing Systems最新文献

英文 中文
AEGIS-Based Efficient Solution for Secure Reconfiguration of FPGAs 基于aegis的fpga安全重构高效解决方案
K. M. Abdellatif, R. Chotin-Avot, H. Mehrez
The reconfiguration of FPGAs includes downloading the bit-stream file which contains the new design on the FPGA. The option to reconfigure FPGAs dynamically opens up the threat of stealing the Intellectual Property (IP) of the design. Since the configuration is usually stored in external memory, this can be easily tapped and read out by an eaves-dropper. This work presents a low cost solution in order to secure the reconfiguration of FPGAs. The proposed solution is based on an efficient-compact hardware implementation for AEGIS which is considered one of the candidates to the competition of CAESAR. The proposed architecture depends on using 1/4 AES-round for reducing the consumed area. We evaluated the presented design using 90 and 65 nm technologies. Our comparison to existing AES-based schemes reveals that the proposed design is better in terms of the hardware performance (Thr./mm2).
FPGA的重构包括在FPGA上下载包含新设计的比特流文件。动态重新配置fpga的选项打开了窃取设计知识产权(IP)的威胁。由于配置通常存储在外部存储器中,这可以很容易地被窃听者窃听和读出。本工作提出了一种低成本的解决方案,以确保fpga的重新配置。提出的解决方案基于高效紧凑的AEGIS硬件实现,AEGIS被认为是CAESAR竞争的候选方案之一。所建议的架构依赖于使用1/4 AES-round来减少消耗的面积。我们使用90纳米和65纳米技术评估了所提出的设计。我们与现有的基于aes的方案进行了比较,发现所提出的设计在硬件性能(Thr./mm2)方面更好。
{"title":"AEGIS-Based Efficient Solution for Secure Reconfiguration of FPGAs","authors":"K. M. Abdellatif, R. Chotin-Avot, H. Mehrez","doi":"10.1145/2858930.2858937","DOIUrl":"https://doi.org/10.1145/2858930.2858937","url":null,"abstract":"The reconfiguration of FPGAs includes downloading the bit-stream file which contains the new design on the FPGA. The option to reconfigure FPGAs dynamically opens up the threat of stealing the Intellectual Property (IP) of the design. Since the configuration is usually stored in external memory, this can be easily tapped and read out by an eaves-dropper. This work presents a low cost solution in order to secure the reconfiguration of FPGAs. The proposed solution is based on an efficient-compact hardware implementation for AEGIS which is considered one of the candidates to the competition of CAESAR. The proposed architecture depends on using 1/4 AES-round for reducing the consumed area. We evaluated the presented design using 90 and 65 nm technologies. Our comparison to existing AES-based schemes reveals that the proposed design is better in terms of the hardware performance (Thr./mm2).","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123011161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Body Biasing Injection Attacks in Practice 身体偏压注射攻击的实践
Noemie Beringuier-Boher, Marc Lacruche, David El-Baze, J. Dutertre, J. Rigaud, P. Maurine
As security constraints are becoming more and more important, even for low-cost and low-power devices, new attacks and countermeasures are constantly proposed. Following this trend, Body Bias Injection (BBI) was introduced a few years ago. This new fault injection method consists in applying a high voltage pulse on the circuit substrate to induce faults. This paper presents an advanced evaluation bench allowing to perform BBI attacks with a good repeatability to evaluate the sensitivity of various circuits to this new threat. The moderate cost of this setup offers the opportunity for every electronic laboratory to use this new attack method and evaluate its effect on various devices. In addition, the physical effects of such attacks are described and a more accurate attack model is given.
随着安全约束越来越重要,即使对于低成本、低功耗的设备,新的攻击和对策也不断被提出。顺应这一趋势,几年前推出了身体偏压注射(BBI)。这种新的故障注入方法是在电路基板上施加高压脉冲来诱发故障。本文提出了一种先进的评估平台,允许执行BBI攻击,具有良好的可重复性,以评估各种电路对这种新威胁的敏感性。这种设置的中等成本为每个电子实验室提供了使用这种新的攻击方法并评估其对各种设备的影响的机会。此外,还描述了这种攻击的物理效应,并给出了更准确的攻击模型。
{"title":"Body Biasing Injection Attacks in Practice","authors":"Noemie Beringuier-Boher, Marc Lacruche, David El-Baze, J. Dutertre, J. Rigaud, P. Maurine","doi":"10.1145/2858930.2858940","DOIUrl":"https://doi.org/10.1145/2858930.2858940","url":null,"abstract":"As security constraints are becoming more and more important, even for low-cost and low-power devices, new attacks and countermeasures are constantly proposed. Following this trend, Body Bias Injection (BBI) was introduced a few years ago. This new fault injection method consists in applying a high voltage pulse on the circuit substrate to induce faults. This paper presents an advanced evaluation bench allowing to perform BBI attacks with a good repeatability to evaluate the sensitivity of various circuits to this new threat. The moderate cost of this setup offers the opportunity for every electronic laboratory to use this new attack method and evaluate its effect on various devices. In addition, the physical effects of such attacks are described and a more accurate attack model is given.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Mode-based Obfuscation using Control-Flow Modifications 使用控制流修改的基于模式的混淆
Sandhya Koteshwara, C. Kim, K. Parhi
Hardware security has emerged as an important topic in the wake of increasing threats on integrated circuits which include reverse engineering, intellectual property (IP) piracy and overbuilding. This paper explores obfuscation of circuits as a hardware security measure and specifically targets digital signal processing (DSP) circuits which are part of most modern systems. The idea of using desired and undesired modes to design obfuscated DSP functions is illustrated using the fast Fourier transform (FFT) as an example. The selection of a mode is dependent on a key input to the circuit. The system is said to work in its desired mode of operation only if the correct key is applied. Other undesired modes are built into the design to confuse an adversary. The approach to obfuscating the design involves control-flow modifications which alter the computations from the desired mode. We present simulation and synthesis results on a reconfigurable, 2-parallel FFT and discuss the security of this approach. It is shown that the proposed approach results in a reconfigurable and flexible design at an area overhead of 8% and a power overhead of 10%.
硬件安全已成为一个重要的话题,随着集成电路的威胁日益增加,包括逆向工程,知识产权(IP)盗版和过度建设。本文探讨了电路混淆作为一种硬件安全措施,并专门针对数字信号处理(DSP)电路,这是大多数现代系统的一部分。以快速傅里叶变换(FFT)为例,阐述了利用期望和非期望模式设计模糊DSP函数的思想。模式的选择取决于电路的键输入。据说,只有在使用正确的密钥时,系统才能以所需的操作模式工作。其他不希望出现的模式则是为了迷惑对手。使设计模糊化的方法包括控制流修改,这将使计算偏离期望的模式。我们给出了一个可重构的2并行FFT的仿真和综合结果,并讨论了这种方法的安全性。结果表明,该方法可在8%的面积开销和10%的功率开销下实现可重构和灵活的设计。
{"title":"Mode-based Obfuscation using Control-Flow Modifications","authors":"Sandhya Koteshwara, C. Kim, K. Parhi","doi":"10.1145/2858930.2858934","DOIUrl":"https://doi.org/10.1145/2858930.2858934","url":null,"abstract":"Hardware security has emerged as an important topic in the wake of increasing threats on integrated circuits which include reverse engineering, intellectual property (IP) piracy and overbuilding. This paper explores obfuscation of circuits as a hardware security measure and specifically targets digital signal processing (DSP) circuits which are part of most modern systems. The idea of using desired and undesired modes to design obfuscated DSP functions is illustrated using the fast Fourier transform (FFT) as an example. The selection of a mode is dependent on a key input to the circuit. The system is said to work in its desired mode of operation only if the correct key is applied. Other undesired modes are built into the design to confuse an adversary. The approach to obfuscating the design involves control-flow modifications which alter the computations from the desired mode. We present simulation and synthesis results on a reconfigurable, 2-parallel FFT and discuss the security of this approach. It is shown that the proposed approach results in a reconfigurable and flexible design at an area overhead of 8% and a power overhead of 10%.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132196975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes 警告:确定性签名方案的侧信道泄漏影响
Hermann Seuschek, Johann Heyszl, F. D. Santis
Two recent proposals by Bernstein and Pornin emphasize the use of deterministic signatures in DSA and its elliptic curve-based variants. Deterministic signatures derive the required ephemeral key value in a deterministic manner from the message to be signed and the secret key instead of using random number generators. The goal is to prevent severe security issues, such as the straight-forward secret key recovery from low quality random numbers. Recent developments have raised skepticism whether e.g. embedded or pervasive devices are able to generate randomness of sufficient quality. The main concerns stem from individual implementations lacking sufficient entropy source and standardized methods for random number generation with suspected back doors. While we support the goal of deterministic signatures, we are concerned about the fact that this has a significant influence on side-channel security of implementations. Specifically, attackers will be able to mount differential side-channel attacks on the additional use of the secret key in a cryptographic hash function to derive the deterministic ephemeral key. Previously, only a simple integer arithmetic function to generate the second signature parameter had to be protected, which is rather straight-forward. Hash functions are significantly more difficult to protect. In this contribution, we systematically explain how deterministic signatures introduce this new side-channel vulnerability.
Bernstein和Pornin最近提出的两个建议强调在DSA及其基于椭圆曲线的变体中使用确定性签名。确定性签名以确定的方式从要签名的消息和秘密密钥派生所需的临时密钥值,而不是使用随机数生成器。目标是防止严重的安全问题,例如从低质量随机数中直接恢复密钥。最近的发展引起了人们的怀疑,例如嵌入式或普及设备是否能够产生足够质量的随机性。主要的问题是单个实现缺乏足够的熵源和标准化的方法来生成带有可疑后门的随机数。虽然我们支持确定性签名的目标,但我们担心这对实现的侧通道安全性有重大影响。具体来说,攻击者将能够对加密散列函数中密钥的额外使用进行差分侧通道攻击,以获得确定性的临时密钥。以前,只需要保护一个简单的整数算术函数来生成第二个签名参数,这相当直接。哈希函数的保护难度要大得多。在这篇文章中,我们系统地解释了确定性签名是如何引入这种新的侧信道漏洞的。
{"title":"A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes","authors":"Hermann Seuschek, Johann Heyszl, F. D. Santis","doi":"10.1145/2858930.2858932","DOIUrl":"https://doi.org/10.1145/2858930.2858932","url":null,"abstract":"Two recent proposals by Bernstein and Pornin emphasize the use of deterministic signatures in DSA and its elliptic curve-based variants. Deterministic signatures derive the required ephemeral key value in a deterministic manner from the message to be signed and the secret key instead of using random number generators. The goal is to prevent severe security issues, such as the straight-forward secret key recovery from low quality random numbers. Recent developments have raised skepticism whether e.g. embedded or pervasive devices are able to generate randomness of sufficient quality. The main concerns stem from individual implementations lacking sufficient entropy source and standardized methods for random number generation with suspected back doors. While we support the goal of deterministic signatures, we are concerned about the fact that this has a significant influence on side-channel security of implementations. Specifically, attackers will be able to mount differential side-channel attacks on the additional use of the secret key in a cryptographic hash function to derive the deterministic ephemeral key. Previously, only a simple integer arithmetic function to generate the second signature parameter had to be protected, which is rather straight-forward. Hash functions are significantly more difficult to protect. In this contribution, we systematically explain how deterministic signatures introduce this new side-channel vulnerability.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124011168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Differential Fault Attack on SIMECK SIMECK的差分故障攻击
Venu Nalla, R. Sahu, V. Saraswat
In 2013, researchers from the National Security Agency of the USA (NSA) proposed two lightweight block ciphers SIMON and SPECK [3]. While SIMON is tuned for optimal performance in hardware, SPECK is tuned for optimal performance in software. At CHES 2015, Yang et al. [6] combined the "good" design components from both SIMON and SPECK and proposed a new lightweight block cipher SIMECK that is even more compact and efficient. In this paper we show that SIMECK is vulnerable to fault attacks and demonstrate two fault attacks on SIMECK. The first is a random bit-flip fault attack which recovers the n-bit last round key of Simeck using on average about n/2 faults and the second is a more practical, random byte fault attack which recovers the n-bit last round key of SIMECK using on average about n/6.5 faults.
2013年,美国国家安全局(NSA)的研究人员提出了两个轻量级分组密码SIMON和SPECK[3]。虽然SIMON在硬件上进行了优化,但SPECK在软件上进行了优化。在CHES 2015上,Yang等人结合了SIMON和SPECK的“优秀”设计组件,提出了一种新的轻量级分组密码SIMECK,它更加紧凑和高效。本文证明了SIMECK易受故障攻击,并举例说明了两种针对SIMECK的故障攻击。第一种是随机比特翻转故障攻击,平均使用约n/2个故障恢复Simeck的n位最后一轮密钥;第二种是更实用的随机字节故障攻击,平均使用约n/6.5个故障恢复Simeck的n位最后一轮密钥。
{"title":"Differential Fault Attack on SIMECK","authors":"Venu Nalla, R. Sahu, V. Saraswat","doi":"10.1145/2858930.2858939","DOIUrl":"https://doi.org/10.1145/2858930.2858939","url":null,"abstract":"In 2013, researchers from the National Security Agency of the USA (NSA) proposed two lightweight block ciphers SIMON and SPECK [3]. While SIMON is tuned for optimal performance in hardware, SPECK is tuned for optimal performance in software. At CHES 2015, Yang et al. [6] combined the \"good\" design components from both SIMON and SPECK and proposed a new lightweight block cipher SIMECK that is even more compact and efficient. In this paper we show that SIMECK is vulnerable to fault attacks and demonstrate two fault attacks on SIMECK. The first is a random bit-flip fault attack which recovers the n-bit last round key of Simeck using on average about n/2 faults and the second is a more practical, random byte fault attack which recovers the n-bit last round key of SIMECK using on average about n/6.5 faults.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130466415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys 物理模糊键的量化和篡改敏感性的实用方面
Vincent Immler, Maxim Hennig, Ludwig Kurzinger, G. Sigl
This work deals with key generation based on Physically Obfuscated Keys (POKs), i.e., a certain type of tamper-evident Physical Unclonable Function (PUF) that can be used as protection against invasive physical attacks. To design a protected device, one must take attacks such as probing of data lines or penetration of the physical security boundary into consideration. For the implementation of a POK as a countermeasure, physical properties of a material -- which covers all parts to be protected -- are measured. After measuring these properties, i.e. analog values, they have to be quantized in order to derive a cryptographic key. This paper will present and discuss the impact of the quantization method with regard to three parameters: key quality, tamper-sensitivity, and reliability. Our contribution is the analysis of two different quantization schemes considering these parameters. Foremost, we propose a new approach to achieve improved tamper-sensitivity in the worst-case with no information leakage. We then analyze a previous solution and compare it to our scenario. Based on empirical data we demonstrate the advantages of our approach. This significantly improves the level of protection of a tamper-resistant cryptographic device compared to cases not benefiting from our scheme.
这项工作涉及基于物理混淆密钥(POKs)的密钥生成,即某种类型的可被篡改的物理不可克隆函数(PUF),可用于防止侵入性物理攻击。在设计受保护的设备时,必须考虑到诸如探测数据线或穿透物理安全边界等攻击。为了实施POK作为一种对策,需要测量材料的物理性质,该材料涵盖所有要保护的部件。在测量了这些属性(即模拟值)之后,必须对它们进行量化,以便推导出加密密钥。本文将介绍并讨论量化方法对三个参数的影响:密钥质量、篡改灵敏度和可靠性。我们的贡献是分析了考虑这些参数的两种不同的量化方案。首先,我们提出了一种新的方法,在最坏情况下,在不泄露信息的情况下,提高篡改灵敏度。然后分析之前的解决方案,并将其与我们的场景进行比较。基于经验数据,我们证明了我们的方法的优势。与不受益于我们的方案的情况相比,这显着提高了防篡改加密设备的保护水平。
{"title":"Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys","authors":"Vincent Immler, Maxim Hennig, Ludwig Kurzinger, G. Sigl","doi":"10.1145/2858930.2858933","DOIUrl":"https://doi.org/10.1145/2858930.2858933","url":null,"abstract":"This work deals with key generation based on Physically Obfuscated Keys (POKs), i.e., a certain type of tamper-evident Physical Unclonable Function (PUF) that can be used as protection against invasive physical attacks. To design a protected device, one must take attacks such as probing of data lines or penetration of the physical security boundary into consideration. For the implementation of a POK as a countermeasure, physical properties of a material -- which covers all parts to be protected -- are measured. After measuring these properties, i.e. analog values, they have to be quantized in order to derive a cryptographic key. This paper will present and discuss the impact of the quantization method with regard to three parameters: key quality, tamper-sensitivity, and reliability. Our contribution is the analysis of two different quantization schemes considering these parameters. Foremost, we propose a new approach to achieve improved tamper-sensitivity in the worst-case with no information leakage. We then analyze a previous solution and compare it to our scenario. Based on empirical data we demonstrate the advantages of our approach. This significantly improves the level of protection of a tamper-resistant cryptographic device compared to cases not benefiting from our scheme.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"141 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130923867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses 标签保护:一种有效的、动态的越界内存访问检测方法
A. Saeed, A. Ahmadinia, Mike Just
Programming languages permitting immediate memory accesses through pointers often result in applications having memory-related errors, which may lead to unpredictable failures and security vulnerabilities. A light-weight solution is presented in this paper to tackle such illegal memory accesses dynamically in C/C++ based applications. We propose a new and effective method of instrumenting an application's source code at compile time in order to detect out-of-bound memory accesses. It is based on creating tags, to be coupled with each memory allocation and then placing additional tag checking instructions for each access made to the memory. The proposed solution is evaluated by instrumenting applications from the BugBench benchmark suite and publicly available benchmark software, Runtime Intrusion Prevention Evaluator (RIPE), detecting all the bugs successfully. The performance and memory overhead is further analysed by instrumenting and executing real world applications.
允许通过指针立即访问内存的编程语言通常会导致应用程序出现与内存相关的错误,这可能导致不可预测的故障和安全漏洞。在基于C/ c++的应用程序中,提出了一种轻量级的动态处理非法内存访问的解决方案。我们提出了一种新的、有效的方法,在编译时检测应用程序的源代码,以检测超出边界的内存访问。它基于创建标记,与每个内存分配相结合,然后为每次对内存的访问放置额外的标记检查指令。通过测试来自BugBench基准测试套件和公开可用的基准测试软件Runtime Intrusion Prevention Evaluator (RIPE)的应用程序,对所提出的解决方案进行了评估,成功检测出所有错误。通过检测和执行实际应用程序,进一步分析性能和内存开销。
{"title":"Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses","authors":"A. Saeed, A. Ahmadinia, Mike Just","doi":"10.1145/2858930.2858936","DOIUrl":"https://doi.org/10.1145/2858930.2858936","url":null,"abstract":"Programming languages permitting immediate memory accesses through pointers often result in applications having memory-related errors, which may lead to unpredictable failures and security vulnerabilities. A light-weight solution is presented in this paper to tackle such illegal memory accesses dynamically in C/C++ based applications. We propose a new and effective method of instrumenting an application's source code at compile time in order to detect out-of-bound memory accesses. It is based on creating tags, to be coupled with each memory allocation and then placing additional tag checking instructions for each access made to the memory. The proposed solution is evaluated by instrumenting applications from the BugBench benchmark suite and publicly available benchmark software, Runtime Intrusion Prevention Evaluator (RIPE), detecting all the bugs successfully. The performance and memory overhead is further analysed by instrumenting and executing real world applications.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130550632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A High Speed Scalar Multiplier for Binary Edwards Curves 二元Edwards曲线的高速标量乘法器
A. Fournaris, N. Sklavos, C. Koulamas
Binary Edwards Curves (BEC) constitute an exciting elliptic curve variation that has very interesting benefits when it comes to side channel attack resistance. However, BECs require more GF(2k) operations for a single scalar multiplication and this acts as a deterring factor for their wide adoption and standardization. In this paper, a high speed BEC scalar multiplication architecture and implementation is proposed based on a parallel design strategy of the GF(2k) operations that provides power analysis attack resistance against a variety of attacks.
二进制爱德华兹曲线(BEC)构成了一种令人兴奋的椭圆曲线变化,当涉及到侧信道攻击抵抗时,它具有非常有趣的好处。然而,对于单个标量乘法,BECs需要更多的GF(2k)运算,这阻碍了BECs的广泛采用和标准化。本文提出了一种基于GF(2k)运算并行设计策略的高速BEC标量乘法架构和实现,该架构提供了抗各种攻击的功率分析攻击能力。
{"title":"A High Speed Scalar Multiplier for Binary Edwards Curves","authors":"A. Fournaris, N. Sklavos, C. Koulamas","doi":"10.1145/2858930.2858938","DOIUrl":"https://doi.org/10.1145/2858930.2858938","url":null,"abstract":"Binary Edwards Curves (BEC) constitute an exciting elliptic curve variation that has very interesting benefits when it comes to side channel attack resistance. However, BECs require more GF(2k) operations for a single scalar multiplication and this acts as a deterring factor for their wide adoption and standardization. In this paper, a high speed BEC scalar multiplication architecture and implementation is proposed based on a parallel design strategy of the GF(2k) operations that provides power analysis attack resistance against a variety of attacks.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"35 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves 椭圆曲线上双点乘法的高效算法和结构
R. Azarderakhsh, Koray Karabina
Efficient implementation of double point multiplication is crucial for elliptic curve cryptographic systems. We propose efficient algorithms and architectures for the computation of double point multiplication on binary elliptic curves and provide a comparative analysis of their performance for 112-bit security level. To the best of our knowledge, this is the first work in the literature which considers the design and implementation of simultaneous computation of double point multiplication. We first provide algorithmics for the three main double point multiplication methods. Then, we perform data-flow analysis and propose hardware architectures for the presented algorithms. Finally, we implement the proposed state-of-the-art architectures on FPGA platform for the comparison purposes and report the area and timing results. Our results indicate that differential addition chain based algorithms are better suited to compute double point multiplication over binary elliptic curves for high performance applications.
双点乘法的有效实现是椭圆曲线密码系统的关键。我们提出了在二元椭圆曲线上计算双点乘法的有效算法和架构,并对它们在112位安全级别上的性能进行了比较分析。据我们所知,这是文献中第一个考虑双点乘法同时计算的设计和实现的工作。我们首先提供了三种主要的双点乘法方法的算法。然后,我们进行了数据流分析,并提出了所提出算法的硬件架构。最后,我们在FPGA平台上实现了所提出的最先进的架构以进行比较,并报告了面积和时序结果。我们的研究结果表明,基于微分加法链的算法更适合于计算二元椭圆曲线上的双点乘法的高性能应用。
{"title":"Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves","authors":"R. Azarderakhsh, Koray Karabina","doi":"10.1145/2858930.2858935","DOIUrl":"https://doi.org/10.1145/2858930.2858935","url":null,"abstract":"Efficient implementation of double point multiplication is crucial for elliptic curve cryptographic systems. We propose efficient algorithms and architectures for the computation of double point multiplication on binary elliptic curves and provide a comparative analysis of their performance for 112-bit security level. To the best of our knowledge, this is the first work in the literature which considers the design and implementation of simultaneous computation of double point multiplication. We first provide algorithmics for the three main double point multiplication methods. Then, we perform data-flow analysis and propose hardware architectures for the presented algorithms. Finally, we implement the proposed state-of-the-art architectures on FPGA platform for the comparison purposes and report the area and timing results. Our results indicate that differential addition chain based algorithms are better suited to compute double point multiplication over binary elliptic curves for high performance applications.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117146837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks 针对指令跳码攻击的对策编写
Thierno Barry, Damien Couroussé, B. Robisson
Physical attacks especially fault attacks represent one the major threats against embedded systems. In the state of the art, software countermeasures against fault attacks are either applied at the source code level where it will very likely be removed at compilation time, or at assembly level where several transformations need to be performed on the assembly code and lead to significant overheads both in terms of code size and execution time. This paper presents the use of compiler techniques to efficiently automate the application of software countermeasures against instruction-skip fault attacks. We propose a modified LLVM compiler that considers our security objectives throughout the compilation process. Experimental results illustrate the effectiveness of this approach on AES implementations running on an ARM-based microcontroller in terms of security overhead compared to existing solutions.
物理攻击尤其是故障攻击是嵌入式系统面临的主要威胁之一。在目前的技术状态下,针对错误攻击的软件对策要么应用于源代码级别,在编译时很可能删除它,要么应用于汇编级别,在汇编级别需要对汇编代码执行几个转换,并在代码大小和执行时间方面导致显著的开销。本文介绍了利用编译器技术有效地自动化应用软件对抗指令跳过错误攻击。我们提出一个修改后的LLVM编译器,它在整个编译过程中考虑我们的安全目标。实验结果表明,与现有解决方案相比,这种方法在基于arm的微控制器上运行的AES实现在安全开销方面是有效的。
{"title":"Compilation of a Countermeasure Against Instruction-Skip Fault Attacks","authors":"Thierno Barry, Damien Couroussé, B. Robisson","doi":"10.1145/2858930.2858931","DOIUrl":"https://doi.org/10.1145/2858930.2858931","url":null,"abstract":"Physical attacks especially fault attacks represent one the major threats against embedded systems. In the state of the art, software countermeasures against fault attacks are either applied at the source code level where it will very likely be removed at compilation time, or at assembly level where several transformations need to be performed on the assembly code and lead to significant overheads both in terms of code size and execution time. This paper presents the use of compiler techniques to efficiently automate the application of software countermeasures against instruction-skip fault attacks. We propose a modified LLVM compiler that considers our security objectives throughout the compilation process. Experimental results illustrate the effectiveness of this approach on AES implementations running on an ARM-based microcontroller in terms of security overhead compared to existing solutions.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"53 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
期刊
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1