The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hardware Trojan (HT) is one of the well known hardware security issue in research community in last one decade. HT research is mainly focused on HT detection, HT defense and designing novel HT's. HT's are inserted by an adversary for leaking secret data, denial of service attacks etc. Trojan benchmark circuits for processors, cryptography and communication protocols from Trust-hub are widely used...
In this paper, the authors apply two modular exponentiation algorithms such as left-to-right binary method and Montgomery powering ladder algorithm on Raspberry Pi and evaluate their security against Side-channel attack.
Time variation during program execution can leak sensitive information. Time variations due to program control flow and hardware resource contention have been used to steal encryption keys in cipher implementations such as AES and RSA. A number of approaches to mitigate timing-based side-channel attacks have been proposed including cache partitioning, control-flow obfuscation and injecting timing...
With the advancement of technology in the last few decades, leading to the widespread availability of miniaturized sensors and internet-connected things (IoT), security of electronic devices has become a top priority. Side-channel attack (SCA) is one of the prominent methods to break the security of an encryption system by exploiting the information leaked from the physical devices. Correlational...
Lightweight ciphers designed with a fully unrolled architecture, capable of encryption/decryption in a single clock cycle, have gained momentum in the last few years. They've shown that very low latency encryption/decryption is possible with modest costs in comparison with traditional round-based designs. This paper explores how to most efficiently perform side-channel analysis against such unrolled...
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention from the DPA (differential power...
With the advent of the Internet of Things (IoT), electronics devices are everywhere in our lives. This omnipresence implies a growing of security issues (data or identity theft, hostile takeover of sensitive equipments…). To counter security vulnerabilities, “Security by Design” methods are being developed. It advises to think about security from the beginning of the conception at both software and...
Using cache-like architectural components including data caches, instruction caches, or branch target buffers as a side channel, software cache-based side-channel attacks are able to derive secret keys used in cryptographic operations through legitimate software activities. Existing software solutions are typically application specific and incur substantial performance overhead. Recent hardware proposals...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.