2020
DOI: 10.46586/tches.v2020.i4.365-388
|View full text |Cite
|
Sign up to set email alerts
|

Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers

Abstract: The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers usually have physical access to a device and therefore side-channel attacks have to be considered. This makes the protection of required cryptographic keys and implementations challenging, especially for commercial off-the-shelf (COTS) microcontrollers that typically have no hardware countermeasures. In this work, we demonstrate how unprotected hardware… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
(23 reference statements)
0
3
0
Order By: Relevance
“…The PI of a leakage model is a side-channel metric that characterizes the amount of information that can be extracted about a target variable X from leakage traces using a given model [RSV + 11]. It is related to the success rate of an adversary that uses this model [DFS19, dCGRP19, MDP20], and it is a lower bound for the Mutual Information (MI) between the leakage and the target variable [BHM + 19, MCHS22], which characterizes the worst-case security of an implementation and therefore makes an interesting tool for side-channel security evaluations [SMY09]. Concretely, and given a model f[l|x] and a set of leakage traces L , the PI can be estimated as:…”
Section: Perceived Informationmentioning
confidence: 99%
“…The PI of a leakage model is a side-channel metric that characterizes the amount of information that can be extracted about a target variable X from leakage traces using a given model [RSV + 11]. It is related to the success rate of an adversary that uses this model [DFS19, dCGRP19, MDP20], and it is a lower bound for the Mutual Information (MI) between the leakage and the target variable [BHM + 19, MCHS22], which characterizes the worst-case security of an implementation and therefore makes an interesting tool for side-channel security evaluations [SMY09]. Concretely, and given a model f[l|x] and a set of leakage traces L , the PI can be estimated as:…”
Section: Perceived Informationmentioning
confidence: 99%
“…However, the efficiency of Hazay et al's scheme is not good so that Abdalla et al (2013) improved their scheme to propose an efficient leakage-resilient symmetric encryption scheme using the AES block cipher without constructing a leakage resilient block cipher. Recently, for enhancing the efficiency, several leakage-resilient authenticated symmetric encryption schemes based on hardware AES coprocessors (Unterstein et al, 2020;Bronchain et al, 2021) have been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the protection of primitives against potent and skillful attackers that can perform simple power analysis or template attacks is still crucial [37]. Nevertheless, leakage resilient schemes have been implemented on micro-controllers and practical evaluation shows that protection against sidechannel attacks can be efficiently achieved in practice against a set of realistic adversaries [56].…”
Section: Introductionmentioning
confidence: 99%