Utilizing Random Noise in Cryptography: Where is the Tofu?
With the massive deployment of mobile devices and sensor networks, resistance against side-channel attacks in cryptographic systems has become an active research topic in recent years. While various security measures exist in literature, most of them are deterministic in nature, where the same input plaintext always results in the same power trace with a given key. Thus, attackers can still aggregate the small deviations between the power traces to identify the correct key. Towards this, random dynamic voltage scaling has been proposed in the literature, which is demonstrated to be effective against Differential Power Analysis (DPA). In this paper, we evaluate this approach, along with the expanded feature of spatial randomness, to resist Correlation Power Analysis (CPA).
H. Geng et al., "Utilizing Random Noise in Cryptography: Where is the Tofu?," Proceedings of the IEEE/ACM Conference on Computer-Aided Design (2012, San Jose, CA), pp. 163-167, Institute of Electrical and Electronics Engineers (IEEE), Nov 2012.
IEEE/ACM Conference on Computer-Aided Design: ICCAD (2012: Nov. 5-8, San Jose, CA)
Electrical and Computer Engineering
Keywords and Phrases
Cryptographic Systems; Differential Power Analysis; Massive Deployment; Plaintext; Power Analysis; Power Traces; Random Dynamics; Random Noise; Research Topics; S-Box; Security Measure; Side Channel Attack; Computer Aided Design; Mobile Devices; Sensor Networks; Voltage Stabilizing Circuits; Cryptography; Correlation Power Analysis; Random Dynamic Voltage Scaling
International Standard Book Number (ISBN)
International Standard Serial Number (ISSN)
Article - Conference proceedings
© 2012 Institute of Electrical and Electronics Engineers (IEEE), All rights reserved.
01 Nov 2012