DOI: 10.1007/978-3-540-74735-2_29
|View full text |Cite
|
Sign up to set email alerts
|

Information Theoretic Evaluation of Side-Channel Resistant Logic Styles

Abstract: Abstract. We propose to apply an information theoretic metric to the evaluation of side-channel resistant logic styles. Due to the long design and development time required for the physical evaluation of such hardware countermeasures, our analysis is based on simulations. Although they do not aim to replace the need of actual measurements, we show that simulations can be used as a meaningful first step in the validation chain of a cryptographic product. For illustration purposes, we apply our methodology to ga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
39
0

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 50 publications
(40 citation statements)
references
References 19 publications
1
39
0
Order By: Relevance
“…That is, we use idealized leakage functions in order to illustrate interesting features of our model. Applications to more complex and practically meaningful contexts can be found in other publications [24,34,36,35].…”
Section: Applications Of the Modelmentioning
confidence: 99%
“…That is, we use idealized leakage functions in order to illustrate interesting features of our model. Applications to more complex and practically meaningful contexts can be found in other publications [24,34,36,35].…”
Section: Applications Of the Modelmentioning
confidence: 99%
“…SABL [35]). Again, there is a security vs. performance tradeoff since designing full-custom hardware is more expensive (at least in development time) than using standard libraries, but the security of the latter ones is generally lower, mainly because they offer less fine tuning possibilities [16].…”
Section: Related Workmentioning
confidence: 99%
“…To evaluate and fairly compare the side-channel leakage of our target designs we applied the information theoretic (IT) analysis of [29] as it has been used for the same purpose e.g., in [16]. So, we collected 512, 000 traces for each target design, i.e., 2000 traces for each S-box input value.…”
Section: Practical Investigationsmentioning
confidence: 99%
“…-The AES S-box circuit operates in precharge-evaluation mode, and in contrast to a CMOS combinatorial circuit its leakage does not depend on two consecutive inputs (input transitions). Therefore, our selection of estimating the probabilities based on the S-box input is a valid choice (the same is given in [16]). …”
Section: Practical Investigationsmentioning
confidence: 99%