首页 > 最新文献

Journal of Cryptographic Engineering最新文献

英文 中文
A critical view on the real-world security of logic locking. 逻辑锁在现实世界中的安全性。
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 Epub Date: 2022-08-20 DOI: 10.1007/s13389-022-00294-x
Susanne Engels, Max Hoffmann, Christof Paar

With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is logic locking, where the genuine functionality of a chip is "locked" using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction-a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction.

随着集成电路的特征尺寸不断缩小,绝大多数半导体公司已经成为无晶圆厂,外包给全球各地的代工厂。这使设计行业面临许多威胁,包括通过知识产权盗窃或未经授权的过度生产以及随后在黑市上转售的盗版行为。据称解决这个问题的一种方法是逻辑锁定,即使用只有设计者知道的密钥将芯片的真正功能“锁定”。只有正确的键,设计工作的预期。因为解锁是由设计师在生产后处理的,所以供应链中的对手不应该能够解锁过度生产的芯片。在这项工作中,我们专注于防止生产过剩威胁的逻辑锁定。首先,我们调查了现有的锁定方案,并通过它们对密钥的处理来描述它们,然后提取所采用的攻击者模型的异同。然后,我们将所述模型与生产过剩的主要对手(恶意铸造厂)的真实能力进行比较。这种比较使我们能够识别现有模型中的缺陷,并派生出更现实的攻击者模型。然后,我们讨论了现有方案如何抵御新的攻击者模型。我们的讨论强调了几种超越通常采用的基于sat的方法的攻击是可行的。至关重要的是,这些攻击源于当前逻辑锁定方法的底层结构,自2008年引入以来从未改变过。我们得出结论,逻辑锁定虽然是一种很有前途的方法,但需要从根本上重新思考,以实现对生产过剩的现实保护。
{"title":"A critical view on the real-world security of logic locking.","authors":"Susanne Engels,&nbsp;Max Hoffmann,&nbsp;Christof Paar","doi":"10.1007/s13389-022-00294-x","DOIUrl":"https://doi.org/10.1007/s13389-022-00294-x","url":null,"abstract":"<p><p>With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become <i>fabless</i>, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is <i>logic locking</i>, where the genuine functionality of a chip is \"locked\" using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction-a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction.</p>","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 3","pages":"229-244"},"PeriodicalIF":1.9,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9464179/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40358123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving recent side-channel attacks against the DES key schedule 改进了最近针对DES密钥调度的侧信道攻击
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-04 DOI: 10.1007/s13389-021-00279-2
A. Wiemers, Johannes Mittmann
{"title":"Improving recent side-channel attacks against the DES key schedule","authors":"A. Wiemers, Johannes Mittmann","doi":"10.1007/s13389-021-00279-2","DOIUrl":"https://doi.org/10.1007/s13389-021-00279-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"1-17"},"PeriodicalIF":1.9,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43803399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications 优化的阈值实现:为低能耗和低延迟应用程序保护加密加速器
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-11-25 DOI: 10.1007/s13389-021-00276-5
Dušan Božilov, Miroslav Knezevic, V. Nikov
{"title":"Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications","authors":"Dušan Božilov, Miroslav Knezevic, V. Nikov","doi":"10.1007/s13389-021-00276-5","DOIUrl":"https://doi.org/10.1007/s13389-021-00276-5","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"15 - 51"},"PeriodicalIF":1.9,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46673530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
In-depth energy analysis of security algorithms and protocols for the Internet of Things 物联网安全算法和协议的深度能量分析
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-11-24 DOI: 10.1007/s13389-021-00274-7
J. Winderickx, An Braeken, Dave Singelée, N. Mentens
{"title":"In-depth energy analysis of security algorithms and protocols for the Internet of Things","authors":"J. Winderickx, An Braeken, Dave Singelée, N. Mentens","doi":"10.1007/s13389-021-00274-7","DOIUrl":"https://doi.org/10.1007/s13389-021-00274-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"137 - 149"},"PeriodicalIF":1.9,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43029428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spatial dependency analysis to extract information from side-channel mixtures: extended version 从侧通道混合物中提取信息的空间相关性分析:扩展版本
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-11-15 DOI: 10.1145/3474376.3487280
Aurélien Vasselle, Hugues Thiebeauld, P. Maurine
Practical side-channel attacks on recent devices may be challenging due to the poor quality of acquired signals. It can originate from different factors, such as the growing architecture complexity, especially in System-on-Chips, creating unpredictable and concurrent operation of multiple signal sources in the device. This work makes use of mixture distributions to formalize this complexity, allowing us to explain the benefit of using a technique like Scatter, where different samples of the traces are aggregated into the same distribution. Some observations of the conditional mixture distributions are made in order to model the leakage in such context. From this, we infer local coherency of information held in the distribution as a general expression of the leakage in mixture distributions. This leads us to introduce how spatial analysis tools, such as Moran’s Index, can be used to significantly improve non-profiled attacks compared to other techniques from the state-of-the-art. Exploitation of this technique is experimentally shown very promising, as demonstrated by its application on two AES implementations including masking and shuffling countermeasures.
由于获取的信号质量差,对最近设备的实际侧信道攻击可能具有挑战性。它可能源于不同的因素,例如不断增长的架构复杂性,尤其是在片上系统中,导致设备中多个信号源的不可预测和并发操作。这项工作利用混合分布来形式化这种复杂性,使我们能够解释使用像Scatter这样的技术的好处,在Scatter中,不同的痕迹样本被聚集到相同的分布中。为了对这种情况下的泄漏进行建模,对条件混合物分布进行了一些观察。由此,我们推断出分布中所含信息的局部相干性,作为混合分布中泄漏的一般表达式。这使我们介绍了与最先进的其他技术相比,如何使用空间分析工具(如莫兰指数)来显著改进非概要攻击。实验表明,该技术的开发非常有前景,正如它在两种AES实现中的应用所证明的那样,包括掩蔽和混洗对策。
{"title":"Spatial dependency analysis to extract information from side-channel mixtures: extended version","authors":"Aurélien Vasselle, Hugues Thiebeauld, P. Maurine","doi":"10.1145/3474376.3487280","DOIUrl":"https://doi.org/10.1145/3474376.3487280","url":null,"abstract":"Practical side-channel attacks on recent devices may be challenging due to the poor quality of acquired signals. It can originate from different factors, such as the growing architecture complexity, especially in System-on-Chips, creating unpredictable and concurrent operation of multiple signal sources in the device. This work makes use of mixture distributions to formalize this complexity, allowing us to explain the benefit of using a technique like Scatter, where different samples of the traces are aggregated into the same distribution. Some observations of the conditional mixture distributions are made in order to model the leakage in such context. From this, we infer local coherency of information held in the distribution as a general expression of the leakage in mixture distributions. This leads us to introduce how spatial analysis tools, such as Moran’s Index, can be used to significantly improve non-profiled attacks compared to other techniques from the state-of-the-art. Exploitation of this technique is experimentally shown very promising, as demonstrated by its application on two AES implementations including masking and shuffling countermeasures.","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-17"},"PeriodicalIF":1.9,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48475659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sycon: a new milestone in designing ASCON-like permutations Sycon:设计ascon类排列的新里程碑
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-10-08 DOI: 10.1007/s13389-021-00272-9
K. Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo
{"title":"Sycon: a new milestone in designing ASCON-like permutations","authors":"K. Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo","doi":"10.1007/s13389-021-00272-9","DOIUrl":"https://doi.org/10.1007/s13389-021-00272-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"305 - 327"},"PeriodicalIF":1.9,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46971729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC 通过现代FPGA-SoC上的恶意硬件打破TrustZone内存隔离和安全启动
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-15 DOI: 10.1007/s13389-021-00273-8
Mathieu Gross, Nisha Jacob, A. Zankl, G. Sigl
{"title":"Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC","authors":"Mathieu Gross, Nisha Jacob, A. Zankl, G. Sigl","doi":"10.1007/s13389-021-00273-8","DOIUrl":"https://doi.org/10.1007/s13389-021-00273-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"181 - 196"},"PeriodicalIF":1.9,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44931232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents CSIDH的SQALE:低指数的亚线性vsamulu抗量子等构作用
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-08-31 DOI: 10.1007/s13389-021-00271-w
J. Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, F. Rodríguez-Henríquez
{"title":"The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents","authors":"J. Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, F. Rodríguez-Henríquez","doi":"10.1007/s13389-021-00271-w","DOIUrl":"https://doi.org/10.1007/s13389-021-00271-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"349 - 368"},"PeriodicalIF":1.9,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45485698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
The ASHES 2019 special issue at JCEN ASHES2019 JCEN特刊
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-08-22 DOI: 10.1007/s13389-021-00270-x
Chip-Hong Chang, Daniel E. Holcomb, U. Rührmair, P. Schaumont
{"title":"The ASHES 2019 special issue at JCEN","authors":"Chip-Hong Chang, Daniel E. Holcomb, U. Rührmair, P. Schaumont","doi":"10.1007/s13389-021-00270-x","DOIUrl":"https://doi.org/10.1007/s13389-021-00270-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"199 - 200"},"PeriodicalIF":1.9,"publicationDate":"2021-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00270-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48633854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rank estimation with bounded error via exponential sampling 基于指数抽样的有界误差秩估计
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-08-04 DOI: 10.1007/s13389-021-00269-4
Liron David, A. Wool
{"title":"Rank estimation with bounded error via exponential sampling","authors":"Liron David, A. Wool","doi":"10.1007/s13389-021-00269-4","DOIUrl":"https://doi.org/10.1007/s13389-021-00269-4","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"151 - 168"},"PeriodicalIF":1.9,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48984396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Cryptographic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1