Insert Random Time-Delay Defense High Order Side-Channel Attack

Article Preview

Abstract:

Side-channel attack is a non destructive physical attacks method. The current cryptographic algorithms are vulnerable to higher-order side-channel attack. To defense high order Side-channel attack, in this paper, a new countermeasure based on inserting random delay is proposed to secure AES against higher-order side-channel attack. By inserting a redundant instruction, it is expected to reduce the correlation between the leakage and the inside operations, and thus make the statistic analysis infeasible. The simulation shows the method is efficiency.

You have full access to the following eBook

Info:

[1] Yongbin Zhou, Dengguo Feng, Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing, Physical Security Testing Workshop, USA, (2005).

Google Scholar

[2] P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of Advances in Cryptology - CRYPTO'96, SpringerVerlag, LNCS 1109, 1996. 104-113.

DOI: 10.1007/3-540-68697-5_9

Google Scholar

[3] Elisabeth Oswald, Stefan Mangard, Christoph Herbst, and Stefan Tillich. Practical second-order DPA attacks for masked smartcard implementations of block ciphers. In: proceeding of CT-RSA 2006, LNCS 3860, 2006. 192-207.

DOI: 10.1007/11605805_13

Google Scholar

[4] Tiri, K., et al. Prototype IC with WDDL and differential rounting - DPA resistance assessment. In: Proceeding of Cryptographic Hardware and Embedded Systems, SpringerVerlag, LNCS 3659, 2005. 354-365.

DOI: 10.1007/11545262_26

Google Scholar

[5] YongBin Zhou, DengGuo Feng. Side channel attacks: ten years after its publication and the impact on cryptographic module security testing. http: / eprint. iacr. org/2005/388, (2005).

Google Scholar

[6] E. Oswald and S. Mangard. Template Attacks on Masking--Resistance is Futile. In: proceeding of CT-RSA 2007, 2007. 12-27.

DOI: 10.1007/11967668_16

Google Scholar

[7] Paul Kocher. Differential power analysis. In: Proceeding of Advances in Cryptology-CRYPTO'99, 1999, vol. 1666, 388-397.

Google Scholar

[8] Jean-Sébastien Coron A1 and Louis Goubin. On Boolean and Arithmetic Masking against Differential Power Analysis. CHES 2000, Lecture Notes in Computer Science, Volume 1965, Springer 2000: 231-237.

DOI: 10.1007/3-540-44499-8_18

Google Scholar