Catálogo de publicaciones - libros

Compartir en
redes sociales


Cryptographic Hardware and Embedded Systems: CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings

Louis Goubin ; Mitsuru Matsui (eds.)

En conferencia: 8º International Workshop on Cryptographic Hardware and Embedded Systems (CHES) . Yokohama, Japan . October 10, 2006 - October 13, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Communication Networks; Special Purpose and Application-Based Systems; Logic Design; Operating Systems; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-46559-1

ISBN electrónico

978-3-540-46561-4

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Implementing Cryptographic Pairings on Smartcards

Michael Scott; Neil Costigan; Wesam Abdulwahab

Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations of Identity-Based Encryption (IBE). In this paper we describe the implementation of various pairings on a contemporary 32-bit smart-card, the Philips HiPerSmart^TM, an instantiation of the MIPS-32 based SmartMIPS^TM architecture. Three types of pairing are considered, first the standard Tate pairing on a nonsupersingular curve $E(\mathbb{F}_p)$ , second the Ate pairing, also on a nonsupersingular curve $E(\mathbb{F}_p)$ , and finally the η _ T pairing on a supersingular curve $E(\mathbb{F}_{2^m})$ . We demonstrate that pairings can be calculated as efficiently as classic cryptographic primitives on this architecture, with a calculation time of as little as 0.15 seconds.

Palabras clave: Elliptic curves; pairing-based cryptosystems; fast implementations.

- Efficient Algorithms for Embedded Processors | Pp. 134-147

SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form

Toru Akishita; Masanobu Katagi; Izuru Kitamura

Hyperelliptic Curve Cryptosystems (HECC) are competitive to elliptic curve cryptosystems in performance and security. Recently efficient scalar multiplication techniques using a theta divisor have been proposed. Their application, however, is limited to the case when a theta divisor is used for the base point. In this paper we propose efficient and secure scalar multiplication of a general divisor for genus 2 HECC over $\mathbb{F}_{2^m}$ . The proposed method is based on two novel techniques. One is divisor decomposition technique in which a general divisor is decomposed into two theta divisors. The other is joint regular form for a pair of integers that enables efficient and secure simultaneous scalar multiplication of two theta divisors. The marriage of the above two techniques achieves both about 19% improvement of efficiency compared to the standard method and resistance against simple power analysis without any dummy operation.

Palabras clave: hyperelliptic curve cryptosystems; scalar multiplication; theta divisor; signed binary representation; simple power analysis.

- Efficient Algorithms for Embedded Processors | Pp. 148-159

Fast Generation of Prime Numbers on Portable Devices: An Update

Marc Joye; Pascal Paillier

The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despite decades of intense mathematical studies on primality testing and an observed progressive intensification of cryptography, prime number generation algorithms remain scarcely investigated and most real-life implementations are of dramatically poor performance. We show simple techniques that substantially improve all algorithms previously suggested or extend their capabilities. We derive fast implementations on appropriately equipped portable devices like smart-cards embedding a cryptographic coprocessor. This allows onboard generation of RSA keys featuring a very attractive (average) processing time. Our motivation here is to help transferring this task from terminals where this operation usually took place so far, to portable devices themselves in near future for more confidence, security, and compliance with network-scaled distributed protocols such as electronic cash or mobile commerce.

Palabras clave: Public-key cryptography; RSA; primality testing; prime number generation; embedded software; efficient implementations; cryptoprocessors; smart cards; PDAs.

- Efficient Algorithms for Embedded Processors | Pp. 160-173

A Proposition for Correlation Power Analysis Enhancement

Thanh-Ha Le; Jessy Clédière; Cécile Canovas; Bruno Robisson; Christine Servière; Jean-Louis Lacoume

Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). First, we give an overview of DPA in mono-bit and multi-bit cases. Next, the existing multi-bit DPA methods are generalized into the proposed Partitioning Power Analysis (PPA) method. Finally, we focus on the CPA technique, showing that this attack is a case of PPA with special coefficients and a normalization factor. We also propose a method that allows us to improve the performance of CPA by restricting the normalization factor.

Palabras clave: side channel; power analysis; DPA; multi-bit DPA; PPA; CPA; correlation; DES; AES.

- Side Channels II | Pp. 174-186

High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching

Naofumi Homma; Sei Nagashima; Yuichi Imai; Takafumi Aoki; Akashi Satoh

This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA), use a statistical analysis of signal waveforms (e.g., power traces) to reduce noise and to retrieve secret information. However, the waveform data often includes displacement errors in the measurements. The use of phase components in the discrete Fourier transforms of the waveforms makes it possible to estimate the displacements between the signal waveforms with higher resolution than the sampling resolution. The accuracy of a side-channel attack can be enhanced using this high-resolution matching method. In this paper, we demonstrate the advantages of the POC-based method in comparison with conventional approaches through experimental DPA and Differential ElectroMagnetic Analysis (DEMA) against a DES software implementation on a Z80 processor.

Palabras clave: side-channel attacks; DPA; DEMA; cryptographic module; waveform matching; phase-only correlation.

- Side Channels II | Pp. 187-200

Cache-Collision Timing Attacks Against AES

Joseph Bonneau; Ilya Mironov

This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified model of the cache to predict timing variation due to cache-collisions in the sequence of lookups performed by the encryption. The attacks presented should be applicable to most high-speed software AES implementations and computing platforms, we have implemented them against OpenSSL v. 0.9.8.(a) running on Pentium III, Pentium IV Xeon, and UltraSPARC III+ machines. The most powerful attack has been shown under optimal conditions to reliably recover a full 128-bit AES key with 2^13 timing samples, an improvement of almost four orders of magnitude over the best previously published attacks of this type [Ber05]. While the task of defending AES against all timing attacks is challenging, a small patch can significantly reduce the vulnerability to these specific attacks with no performance penalty.

Palabras clave: AES; cryptanalysis; side-channel attack; timing attack; cache.

- Side Channels II | Pp. 201-215

Provably Secure S-Box Implementation Based on Fourier Transform

Emmanuel Prouff; Christophe Giraud; Sébastien Aumônier

Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric cryptographic implementations against DPA is to use masking techniques. However, clever masking of non-linear parts such as S-Boxes is difficult and has been the flaw of many countermeasures. In this article, we take advantage of some remarkable properties of the Fourier Transform to propose a new method to thwart DPA on the implementation of every S-Box. After introducing criteria so that an implementation is qualified as DPA-resistant, we prove the security of our scheme. Finally, we apply the method to FOX and AES S-Boxes and we show in the latter case that the resulting implementation is one of the most efficient.

Palabras clave: Differential Power Analysis; Provably Secure Countermeasure; Fourier Transform; Symmetric Cryptosystems; S-Box; AES; FOX.

- Side Channels II | Pp. 216-230

The Outer Limits of RFID Security

Ari Juels

It is tempting to regard RFID security and privacy primarily as questions of cryptographic protocol design. We would like RFID tags to authenticate themselves in a trustworthy manner. We would also like them to protect the identities and personal data of their bearers. We might imagine that our aims should be to squeeze cryptographic primitives down to the constrained environments of RFID tags and to craft protocols that scale up to populations of millions or billions of devices. By adapting existing tools, it might seem that we can readily fulfill the majority of our needs with some more circuitry in tags, a greater abundance of cycles and memory on application servers, and a bit of clever economizing.

Palabras clave: Outer Limit; Covert Channel; Cryptographic Primitive; Conventional Picture; Cryptologic Research.

- Invited Talk II | Pp. 231-231

Three-Phase Dual-Rail Pre-charge Logic

Marco Bucci; Luca Giancane; Raimondo Luzzi; Alessandro Trifiletti

This paper investigates the design of a dual-rail pre-charge logic family whose power consumption is insensitive to unbalanced load conditions thus allowing adopting a semi-custom design flow (automatic place & route) without any constraint on the routing of the complementary wires. The proposed logic is based on a three phase operation where, in order to obtain a constant energy consumption over the operating cycle, an additional discharge phase is performed after pre-charge and evaluation. In this work, the proposed concept has been implemented as an enhancement of the SABL logic with a limited increase in circuit complexity. Implementation details and simulation results are reported which show a power consumption independent of the sequence of processed data and load capacitances. An improvement in the energy consumption balancing up to 100 times with respect to SABL has been obtained.

Palabras clave: DPA; dual-rail logic; SABL; security.

- Hardware Attacks and Countermeasures II | Pp. 232-241

Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage

Zhimin Chen; Yujie Zhou

Recent research has shown that cryptographers with glitches are vulnerable in front of Side Channel Attacks (SCA). Since then, several methods, such as Wave Dynamic Differential Logic (WDDL) and Masked Dual-Rail Pre-charge Logic (MDPL), have been presented to make circuits clean. In this paper, we propose a more accurate power model based on logic gates’ output transitions and divide it into pieces according to input signals’ transformations. Based on our model, we demonstrate that 1-bit masked logic gates with asynchronous inputs always leak side-channel information from their output transitions. Therefore, even those gates designed without glitches are still susceptible to be attacked. To solve this problem, Dual-Rail Random Switching Logic (DRSL) is presented. By introducing a local pre-charge signal, DRSL gates have their inputs synchronized. Experimental results indicate that DRSL eliminates most of the leakage.

Palabras clave: Side Channel Attacks; DPA; Gate Level Masking; DRSL; Dual-Rail; Pre-charge.

- Hardware Attacks and Countermeasures II | Pp. 242-254