Advertisement

An Efficient Method for Random Delay Generation in Embedded Software

  • Jean-Sébastien Coron
  • Ilya Kizhvatov
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5747)

Abstract

Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of random delays and a criterion for measuring the efficiency of a random delay countermeasure. We implement this new method along with the existing ones on an 8-bit platform and mount practical side-channel attacks against the implementations. We show that the new method is significantly more secure in practice than the previously published solutions and also more lightweight.

Keywords

Side channel attacks countermeasures random delays 

References

  1. 1.
    Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252–263. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Mangard, S.: Hardware countermeasures against dpa—a statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222–235. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Amiel, F., Clavier, C., Tunstall, M.: Fault analysis of dpa-resistant algorithms. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 223–236. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Tunstall, M., Benoit, O.: Efficient use of random delays in embedded software. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 27–38. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Nagashima, S., Homma, N., Imai, Y., Aoki, T., Satoh, A.: dpa using phase-based waveform matching against random-delay countermeasure. In: IEEE International Symposium on Circuits and Systems—ISCAS 2007, May 2007, pp. 1807–1810 (2007)Google Scholar
  6. 6.
    Brier, E., Clavier, C., Benoit, O.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 135–152. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Jean-Sébastien Coron
    • 1
  • Ilya Kizhvatov
    • 1
  1. 1.Université du LuxembourgLuxembourg

Personalised recommendations