DocumentCode
465247
Title
Side-Channel Attack Pitfalls
Author
Tiri, Kris
Author_Institution
Intel Corp., Santa Clara
fYear
2007
fDate
4-8 June 2007
Firstpage
15
Lastpage
20
Abstract
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption or the execution time variations of the device in normal operation mode. The power traces of 8000 encryptions are for instance sufficient to extract the secret key of an unprotected ASIC AES implementation, which is orders of magnitude smaller than the 2128 tests required to brute force the algorithm. A careful implementation can address these vulnerabilities, yet the solutions conflict with the common design goals to optimize for area, performance and power consumption. This paper introduces the side-channel attack pitfalls, which help create or facilitate the observation of the information leakage, discusses mitigation strategies and identifies opportunities for future research.
Keywords
cryptography; cryptographic algorithms; information leakage; side-channel attack pitfalls; Computer architecture; Data security; Delay effects; Design optimization; Energy consumption; Hardware; Permission; Public key; Public key cryptography; Software algorithms; Design; Differential Power Analysis; Encryption; Security; Security IC; Side-Channel Attack; Verification;
fLanguage
English
Publisher
ieee
Conference_Titel
Design Automation Conference, 2007. DAC '07. 44th ACM/IEEE
Conference_Location
San Diego, CA
ISSN
0738-100X
Print_ISBN
978-1-59593-627-1
Type
conf
Filename
4261135
Link To Document