A novel mutating runtime architecture for embedding multiple countermeasures against side-channel attacks

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Over the last decades computer-aided engineering tools have been developed and improved in order to raise productivity in the chip design business. At the same time reconfigurable microelectronic devices known as field programmable gates arrays (FPGAs) evolved into powerful platforms for the implementation of complex embedded systems. Up to now, these design tools do not support a consistent design strategy for the development of side-channel resistant hardware implementations of cryptographic algorithms. In order to close this gap, we present a novel architecture denoted as Mutating Runtime Architecture and a dedicated design flow aimed to support system designers in implementing cryptographic devices hardened against side-channel attacks (SCA). Our contributions are generic in the sense that they allow to uniformly harden symmetric as well as asymmetric cryptographic algorithms against power analysis attacks. In addition to an introduction of fundamental concepts, construction methods for multiple countermeasures, and the resulting flexible cipher architecture, we present a case study.

Cite

CITATION STYLE

APA

Huss, S. A., & Stöttinger, M. (2017). A novel mutating runtime architecture for embedding multiple countermeasures against side-channel attacks. In Hardware IP Security and Trust (pp. 165–184). Springer International Publishing. https://doi.org/10.1007/978-3-319-49025-0_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free