TY - GEN
T1 - Side channel resistance quantification and verification
AU - Cohen, Aaron E.
AU - Parhi, Keshab K.
PY - 2007/12/1
Y1 - 2007/12/1
N2 - In this paper, a formal method for quantifying the side channel resistance based on a statistical approach is developed and a formal CAD method for verifying the side channel resistance of a circuit design is presented. Our analysis indicates that designs which have small means for the difference in power consumption between key bits and high standard deviations for the difference can achieve higher security. Our analytical results for quantifying side channel resistance indicate that it is not feasible to achieve 2 80 security against side channel attacks with low standard deviation or with large means in the difference between key bit runs. Additionally, our analytical results for a preliminary CAD approach to detecting side channel leakage show that significant computing resources are required to gain enough statistics on the power consumption of a circuit to make reasonable approximations about the system's side channel resistance performance prior to implementation when the side channel attacks are unknown; however, our results indicate that it is feasible to detect individual side channel vulnerabilities when the side channel attacks are known.
AB - In this paper, a formal method for quantifying the side channel resistance based on a statistical approach is developed and a formal CAD method for verifying the side channel resistance of a circuit design is presented. Our analysis indicates that designs which have small means for the difference in power consumption between key bits and high standard deviations for the difference can achieve higher security. Our analytical results for quantifying side channel resistance indicate that it is not feasible to achieve 2 80 security against side channel attacks with low standard deviation or with large means in the difference between key bit runs. Additionally, our analytical results for a preliminary CAD approach to detecting side channel leakage show that significant computing resources are required to gain enough statistics on the power consumption of a circuit to make reasonable approximations about the system's side channel resistance performance prior to implementation when the side channel attacks are unknown; however, our results indicate that it is feasible to detect individual side channel vulnerabilities when the side channel attacks are known.
UR - http://www.scopus.com/inward/record.url?scp=47649114671&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=47649114671&partnerID=8YFLogxK
U2 - 10.1109/EIT.2007.4374454
DO - 10.1109/EIT.2007.4374454
M3 - Conference contribution
AN - SCOPUS:47649114671
SN - 1424409411
SN - 9781424409419
T3 - 2007 IEEE International Conference on Electro/Information Technology, EIT 2007
SP - 130
EP - 134
BT - 2007 IEEE International Conference on Electro/Information Technology, EIT 2007
T2 - 2007 IEEE International Conference on Electro/Information Technology, EIT 2007
Y2 - 17 May 2007 through 20 May 2007
ER -