Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations

2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC)(2020)

引用 12|浏览74
暂无评分
摘要
Electromagnetic (EM) side-channel attacks aim at extracting secret information from cryptographic hardware implementations. Countermeasures have been proposed at device level, register-transfer level (RTL) and layout level, though efficient, there are still requirements for quantitative assessment of the hardware implementations' resistance against EM side-channel attacks. In this paper, we propose a design for EM side-channel security evaluation and optimization framework based on the t-test evaluation results derived from RTL hardware implementations. Different implementations of the same cryptographic algorithm are evaluated under different hypothesis leakage models considering the driven capabilities of logic components, and the evaluation results are validated with side-channel attacks on FPGA platform. Experimental results prove the feasibility of the proposed side-channel leakage evaluation method at pre-silicon stage. The remedies and suggested security design rules are also discussed.
更多
查看译文
关键词
t-test evaluation results,RTL hardware implementations,cryptographic algorithm,side-channel leakage evaluation method,security design rules,quantitative assessment,electromagnetic side-channel attacks,secret information extraction,cryptographic hardware implementations,device level,layout level,EM side-channel attacks,optimization framework,hypothesis leakage models,EM side-channel security evaluation,logic components,FPGA platform
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要