DocumentCode
3128063
Title
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Author
Bringer, Julien ; Chabanne, Hervé ; Danger, Jean-Luc
Author_Institution
Sagem Securite, Paris, France
fYear
2009
fDate
9-11 Dec. 2009
Firstpage
183
Lastpage
188
Abstract
Protecting an implementation against side channel analysis for reverse engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a first proof of concept. White-box cryptography has been developed to protect programs against an adversary who has full access to their software implementation. It has also been suggested as a countermeasure against side channel attacks and we examine here these techniques in the wider perspective of SCARE. We consider that the adversary has only access to the cryptographic device through its side channels and his goal is to recover the specifications of the algorithm. In this work, we focus on FPGA (field-programmable gate array) technologies and examine how to thwart SCARE attacks by implementing a block cipher following white-box techniques. The proposed principle is based on changing dynamically the implementations. It is illustrated by an example on the Noekeon cipher and feasibility in different FPGAs is studied.
Keywords
cryptography; field programmable gate arrays; FPGA; NOEKEON cipher; SCARE attacks; block cipher; dynamic implementations; field-programmable gate array; side channel analysis-for-reverse engineering attacks; software implementation; white-box cryptography; Cryptography; Field programmable gate arrays; GSM; Hardware; Protection; Resists; Reverse engineering; Software algorithms; Table lookup; FPGA; SCARE attacks; white-box cryptography;
fLanguage
English
Publisher
ieee
Conference_Titel
Reconfigurable Computing and FPGAs, 2009. ReConFig '09. International Conference on
Conference_Location
Quintana Roo
Print_ISBN
978-1-4244-5293-4
Electronic_ISBN
978-0-7695-3917-1
Type
conf
DOI
10.1109/ReConFig.2009.19
Filename
5382049
Link To Document