TU Darmstadt / ULB / TUbiblio

A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules

Huss, Sorin ; Stein, Oliver (2017)
A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules.
In: Journal of Low Power Electronics and Applications, 7 (1)
doi: 10.3390/jlpea7010004
Article, Bibliographie

This is the latest version of this item.

Abstract

Over the last few decades, computer-aided engineering (CAE) tools have been developed and improved in order to ensure a short time-to-market in the chip design business. Up to now, these design tools do not yet support an integrated design strategy for the development of side-channel-resistant hardware implementations. In order to close this gap, a novel framework named AMASIVE (Adaptable Modular Autonomous SIde-Channel Vulnerability Evaluator) was developed. It supports the designer in implementing devices hardened against power attacks by exploiting novel security-driven synthesis methods. The article at hand can be seen as the second of the two contributions that address the AMASIVE framework. While the first one describes how the framework automatically detects vulnerabilities against power attacks, the second one explains how a design can be hardened in an automatic way by means of appropriate countermeasures, which are tailored to the identified weaknesses. In addition to the theoretical introduction of the fundamental concepts, we demonstrate an application to the hardening of a complete hardware implementation of the block cipher PRESENT.

Item Type: Article
Erschienen: 2017
Creators: Huss, Sorin ; Stein, Oliver
Type of entry: Bibliographie
Title: A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Language: English
Date: 2017
Place of Publication: Basel
Publisher: MDPI
Journal or Publication Title: Journal of Low Power Electronics and Applications
Volume of the journal: 7
Issue Number: 1
Collation: 20 Seiten
DOI: 10.3390/jlpea7010004
Corresponding Links:
Abstract:

Over the last few decades, computer-aided engineering (CAE) tools have been developed and improved in order to ensure a short time-to-market in the chip design business. Up to now, these design tools do not yet support an integrated design strategy for the development of side-channel-resistant hardware implementations. In order to close this gap, a novel framework named AMASIVE (Adaptable Modular Autonomous SIde-Channel Vulnerability Evaluator) was developed. It supports the designer in implementing devices hardened against power attacks by exploiting novel security-driven synthesis methods. The article at hand can be seen as the second of the two contributions that address the AMASIVE framework. While the first one describes how the framework automatically detects vulnerabilities against power attacks, the second one explains how a design can be hardened in an automatic way by means of appropriate countermeasures, which are tailored to the identified weaknesses. In addition to the theoretical introduction of the fundamental concepts, we demonstrate an application to the hardening of a complete hardware implementation of the block cipher PRESENT.

Uncontrolled Keywords: side-channel analysis, secure CAE design
Additional Information:

This article belongs to the Special Issue Hardware Security – Threats and Countermeasures at the Circuit and Logic Levels

Classification DDC: 600 Technology, medicine, applied sciences > 621.3 Electrical engineering, electronics
Divisions: 18 Department of Electrical Engineering and Information Technology
18 Department of Electrical Engineering and Information Technology > Integrierte Schaltungen und Systeme
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
Date Deposited: 02 May 2024 13:14
Last Modified: 02 May 2024 13:14
PPN:
Export:
Suche nach Titel in: TUfind oder in Google

Available Versions of this Item

Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details