[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
:: Volume 8, Issue 2 (2-2020) ::
3 2020, 8(2): 17-28 Back to browse issues page
Threshold Implementation as a Countermeasure against Power Analysis Attacks
Sara Zarei, Hadi Soleimany
Assistant professor, Cyberspace Research Institute, Shahid Beheshti University
Abstract:   (1051 Views)
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use different methods and can be applied at different levels. Masking is an effective one which provides provable security in algorithm level. however even masked algorithms are sometimes suspected to leak kind of information in a condition that implemented in hardware leads to power analysis attacks. Threshold implementation is a way to secure hardware implementations against such probable challenges. In this paper, first we will introduce the different attack models in block ciphers, then we will concentrate on the gray-box model and explain the concepts of power analysis attacks and fundamentals of masking countermeasure. Later we will discuss the challenges of masking method in hardware implementations and introduce threshold implementation and its different aspects.
Keywords: Block ciphers, Hardware security, Threshold implementation
Full-Text [PDF 9466 kb]   (222 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2019/07/17 | Accepted: 2020/11/14 | Published: 2020/11/23
Send email to the article author

Add your comments about this article
Your username or Email:


XML   Persian Abstract   Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Zarei S, Soleimany H. Threshold Implementation as a Countermeasure against Power Analysis Attacks. 3 2020; 8 (2) :17-28
URL: http://monadi.isc.org.ir/article-1-150-en.html

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 8, Issue 2 (2-2020) Back to browse issues page
دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 30 queries by YEKTAWEB 4514