مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

88
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

116
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack

Pages

  47-55

Abstract

 The Template Attack is one of the most e cient attacks for exploiting the secret key. Template-based attack extracts a model for the behavior of side channel information from a device that is similar to the target device and then uses this model to retrieve the correct key on the target victim device. Until now, many researchers have focused on improving the performance of Template Attacks, but recently, a few countermeasures have been proposed to protect the design against these attacks. On the other hand, researches show that regular countermeasures against these attacks are costly. Randomized shu ing in the time domain is known as a cost-e ective countermeasure against Side-Channel Attacks that are widely used. In this article, we implemented an actual Template Attack and proposed an e cient countermeasure against it. We focus on the time shifting method against Template Attack. The results show that Template Attack is very susceptible to this method. The performance of attack on an AES algorithm is considerably reduced with this method. We reported the analysis results of our countermeasure. The performance of the attack can be determined according to various criteria. One of these criteria is the success rate of the attack. According to these results, Template Attack will be hardened signi cantly after the proposed protection such that the grade of the key recovery increases from 1 with 350K traces in unprotected design to 2 100 with 700K traces in the protected circuit. This security improvement gains in the cost of about 7% delay overhead.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Kordi, Farshideh, Hosseintalaee, Hamed, & JAHANIAN, ALI. (2022). A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 14(1), 47-55. SID. https://sid.ir/paper/974931/en

    Vancouver: Copy

    Kordi Farshideh, Hosseintalaee Hamed, JAHANIAN ALI. A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2022;14(1):47-55. Available from: https://sid.ir/paper/974931/en

    IEEE: Copy

    Farshideh Kordi, Hamed Hosseintalaee, and ALI JAHANIAN, “A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 14, no. 1, pp. 47–55, 2022, [Online]. Available: https://sid.ir/paper/974931/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button