Over the last decades computer-aided engineering tools have been developed and improved in order to raise productivity in the chip design business. At the same time reconfigurable microelectronic devices known as field programmable gates arrays (FPGAs) evolved into powerful platforms for the implementation of complex embedded systems. Up to now, these design tools do not support a consistent design strategy for the development of side-channel resistant hardware implementations of cryptographic algorithms. In order to close this gap, we present a novel architecture denoted as Mutating Runtime Architecture and a dedicated design flow aimed to support system designers in implementing cryptographic devices hardened against side-channel attacks (SCA). Our contributions are generic in the sense that they allow to uniformly harden symmetric as well as asymmetric cryptographic algorithms against power analysis attacks. In addition to an introduction of fundamental concepts, construction methods for multiple countermeasures, and the resulting flexible cipher architecture, we present a case study.
CITATION STYLE
Huss, S. A., & Stöttinger, M. (2017). A novel mutating runtime architecture for embedding multiple countermeasures against side-channel attacks. In Hardware IP Security and Trust (pp. 165–184). Springer International Publishing. https://doi.org/10.1007/978-3-319-49025-0_8
Mendeley helps you to discover research relevant for your work.