DocumentCode :
2102224
Title :
Towards secure cryptographic software implementation against side-channel power analysis attacks
Author :
Luo, Pei ; Zhang, Liwei ; Fei, Yunsi ; Ding, A.Adam
Author_Institution :
Electrical & Computer Engineering Department, Northeastern University, Boston, MA 02115 USA
fYear :
2015
fDate :
27-29 July 2015
Firstpage :
144
Lastpage :
148
Abstract :
Side-channel attacks have been a real threat against many embedded cryptographic systems. A commonly used algorithmic countermeasure, random masking, incurs large execution delay and resource overhead. The other countermeasure, operation shuffling or permutation, can mitigate side-channel leakage effectively with minimal overhead. In this paper, we target automatically implementing operation shuffling in cryptographic algorithms to resist against side-channel power analysis attacks. We design a tool to detect independence among statements at the source code level and devise an algorithm for automatic operation shuffling. We test our algorithm on the new SHA3 standard, Keccak. Results show that the tool effectively implements operation-shuffling to reduce the side-channel leakage significantly, and therefore can guide automatic secure cryptographic software implementations against differential power analysis attacks.
Keywords :
Algorithm design and analysis; Arrays; Correlation; Cryptography; Software; Software algorithms; Space exploration; Keccak; Side-channel attacks; shuffling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Application-specific Systems, Architectures and Processors (ASAP), 2015 IEEE 26th International Conference on
Conference_Location :
Toronto, ON, Canada
Type :
conf
DOI :
10.1109/ASAP.2015.7245722
Filename :
7245722
Link To Document :
بازگشت