• DocumentCode
    465247
  • Title

    Side-Channel Attack Pitfalls

  • Author

    Tiri, Kris

  • Author_Institution
    Intel Corp., Santa Clara
  • fYear
    2007
  • fDate
    4-8 June 2007
  • Firstpage
    15
  • Lastpage
    20
  • Abstract
    While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption or the execution time variations of the device in normal operation mode. The power traces of 8000 encryptions are for instance sufficient to extract the secret key of an unprotected ASIC AES implementation, which is orders of magnitude smaller than the 2128 tests required to brute force the algorithm. A careful implementation can address these vulnerabilities, yet the solutions conflict with the common design goals to optimize for area, performance and power consumption. This paper introduces the side-channel attack pitfalls, which help create or facilitate the observation of the information leakage, discusses mitigation strategies and identifies opportunities for future research.
  • Keywords
    cryptography; cryptographic algorithms; information leakage; side-channel attack pitfalls; Computer architecture; Data security; Delay effects; Design optimization; Energy consumption; Hardware; Permission; Public key; Public key cryptography; Software algorithms; Design; Differential Power Analysis; Encryption; Security; Security IC; Side-Channel Attack; Verification;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Design Automation Conference, 2007. DAC '07. 44th ACM/IEEE
  • Conference_Location
    San Diego, CA
  • ISSN
    0738-100X
  • Print_ISBN
    978-1-59593-627-1
  • Type

    conf

  • Filename
    4261135