2020
DOI: 10.3390/cryptography4020013
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity

Abstract: This paper investigates countermeasures to side-channel attacks. A dynamic partial reconfiguration (DPR) method is proposed for field programmable gate arrays (FPGAs)s to make techniques such as differential power analysis (DPA) and correlation power analysis (CPA) difficult and ineffective. We call the technique side-channel power resistance for encryption algorithms using DPR, or SPREAD. SPREAD is designed to reduce cryptographic key related signal correlations in power supply transients by changing componen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…In their work, Bow et al (2020) present Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity (SPREAD). This paper is a power countermeasure proof-of-concept that shows that input-to-output delays are distinct for each circuit structure used.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In their work, Bow et al (2020) present Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity (SPREAD). This paper is a power countermeasure proof-of-concept that shows that input-to-output delays are distinct for each circuit structure used.…”
Section: Related Workmentioning
confidence: 99%
“…This research will also only utilize a synthesis-directed circuit variant generation method as opposed to SPREAD which also includes additional hardware for a circuit-directed approach. To introduce gate-level diversity, we will use a program encryption toolkit (Forbes, 2017) to generate equivalent circuits that vary in size and composition where the method in (Bow et al, 2020) exclude specific gate types when generating netlists for each version. Lastly, the proposed countermeasure will be not only be assessed for power analysis resistance but for localized EM analysis resistance as well.…”
Section: Related Workmentioning
confidence: 99%
“…Compared to the approach in [8] where the circuit structure is fixed, there is much more freedom during synthesis to change the structure of the circuit. The work in [11] also explores synthesis level changes by using sub-sets of a standard cell library while synthesizing the Sbox, resulting in different structural realizations of the Sbox. However, unlike the work in [10], this approach lacks flexibility to generate a large number of distinct variants.…”
Section: Background and Previous Workmentioning
confidence: 99%
“…Another signifi cant area of research has been the focus on enhancing resistance to side-channel attacks, which exploit physical implementations of cryptographic algorithms. Innovations in block cipher modes are increasingly incorporating countermeasures against such attacks, ensuring that security is maintained not only at the algorithmic level but also in practical implementations [24].…”
Section: Introductionmentioning
confidence: 99%