Presentation | 2012-09-21 An Efficient Method of Strictly Evaluating Side-Channel Security Takeshi KISHIKAWA, Shohei SAITO, Yuu TSUCHIYA, Tsuyoshi TOYAMA, Tsutomu MATSUMOTO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Evaluation of side-channel security, i.e., resistance against side-channel attacks of cryptographic modules is definitely important. A practical issue in side-channel security evaluation for the modules with some countermeasures against attacks is the huge number of, say DPA, traces to have relevant evaluation results. Power consumption of a cryptographic module depends on its input plaintext and the key used. In order to strictly evaluate the side-channel security of the module we propose an approach in which we input chosen plaintexts to the module which are calculated from a given key to be installed into the module. We theoretically and experimentally demonstrate that this approach is very powerful. For example we need less than ten plaintexts for AES circuit which has no special countermeasures for power analysis attacks. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cryptographic Module / Side Channel Attack / Correlation Power Analysis / Security Evaluation |
Paper # | ISEC2012-56 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2012/9/14(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | An Efficient Method of Strictly Evaluating Side-Channel Security |
Sub Title (in English) | |
Keyword(1) | Cryptographic Module |
Keyword(2) | Side Channel Attack |
Keyword(3) | Correlation Power Analysis |
Keyword(4) | Security Evaluation |
1st Author's Name | Takeshi KISHIKAWA |
1st Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University() |
2nd Author's Name | Shohei SAITO |
2nd Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University |
3rd Author's Name | Yuu TSUCHIYA |
3rd Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University |
4th Author's Name | Tsuyoshi TOYAMA |
4th Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University |
5th Author's Name | Tsutomu MATSUMOTO |
5th Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University |
Date | 2012-09-21 |
Paper # | ISEC2012-56 |
Volume (vol) | vol.112 |
Number (no) | 211 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |