Tamper Resistance Verification Method for Consumer Security Products. Yoshikawa, M. & Asai, T. In 2014 International Conference on Computational Science and Computational Intelligence (CSCI), volume 2, pages 30–33, March, 2014. doi abstract bibtex Consumer security products handling confidential information are secured by encrypting data. The encryption standard, which has been widely diffused in recent years, is certified that its decryption is computationally impossible. However, it was recently reported that even if an encryption algorithm is theoretically secured, when the algorithm is incorporated into hardware, confidential information about the algorithm could be improperly revealed using power consumption data when the hardware is operated. Such improper specifications are generally called side-channel attacks. Therefore, when an encryption algorithm is incorporated into hardware, evaluation of the resistance against power analysis attacks (tamper resistance) becomes important in the design stage of the circuit. The present study proposes a new method for efficient verification of tamper resistance against power analysis attacks when designing a cryptography circuit. The validity of the proposed method is confirmed using design data of an experimentally produced chip of the advanced encryption standard (AES).
@inproceedings{yoshikawa_tamper_2014,
title = {Tamper {Resistance} {Verification} {Method} for {Consumer} {Security} {Products}},
volume = {2},
doi = {10.1109/CSCI.2014.90},
abstract = {Consumer security products handling confidential information are secured by encrypting data. The encryption standard, which has been widely diffused in recent years, is certified that its decryption is computationally impossible. However, it was recently reported that even if an encryption algorithm is theoretically secured, when the algorithm is incorporated into hardware, confidential information about the algorithm could be improperly revealed using power consumption data when the hardware is operated. Such improper specifications are generally called side-channel attacks. Therefore, when an encryption algorithm is incorporated into hardware, evaluation of the resistance against power analysis attacks (tamper resistance) becomes important in the design stage of the circuit. The present study proposes a new method for efficient verification of tamper resistance against power analysis attacks when designing a cryptography circuit. The validity of the proposed method is confirmed using design data of an experimentally produced chip of the advanced encryption standard (AES).},
booktitle = {2014 {International} {Conference} on {Computational} {Science} and {Computational} {Intelligence} ({CSCI})},
author = {Yoshikawa, M. and Asai, T.},
month = mar,
year = {2014},
pages = {30--33}
}
Downloads: 0
{"_id":"3sxGFz2o83uBSDhmC","bibbaseid":"yoshikawa-asai-tamperresistanceverificationmethodforconsumersecurityproducts-2014","authorIDs":[],"author_short":["Yoshikawa, M.","Asai, T."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Tamper Resistance Verification Method for Consumer Security Products","volume":"2","doi":"10.1109/CSCI.2014.90","abstract":"Consumer security products handling confidential information are secured by encrypting data. The encryption standard, which has been widely diffused in recent years, is certified that its decryption is computationally impossible. However, it was recently reported that even if an encryption algorithm is theoretically secured, when the algorithm is incorporated into hardware, confidential information about the algorithm could be improperly revealed using power consumption data when the hardware is operated. Such improper specifications are generally called side-channel attacks. Therefore, when an encryption algorithm is incorporated into hardware, evaluation of the resistance against power analysis attacks (tamper resistance) becomes important in the design stage of the circuit. The present study proposes a new method for efficient verification of tamper resistance against power analysis attacks when designing a cryptography circuit. The validity of the proposed method is confirmed using design data of an experimentally produced chip of the advanced encryption standard (AES).","booktitle":"2014 International Conference on Computational Science and Computational Intelligence (CSCI)","author":[{"propositions":[],"lastnames":["Yoshikawa"],"firstnames":["M."],"suffixes":[]},{"propositions":[],"lastnames":["Asai"],"firstnames":["T."],"suffixes":[]}],"month":"March","year":"2014","pages":"30–33","bibtex":"@inproceedings{yoshikawa_tamper_2014,\n\ttitle = {Tamper {Resistance} {Verification} {Method} for {Consumer} {Security} {Products}},\n\tvolume = {2},\n\tdoi = {10.1109/CSCI.2014.90},\n\tabstract = {Consumer security products handling confidential information are secured by encrypting data. The encryption standard, which has been widely diffused in recent years, is certified that its decryption is computationally impossible. However, it was recently reported that even if an encryption algorithm is theoretically secured, when the algorithm is incorporated into hardware, confidential information about the algorithm could be improperly revealed using power consumption data when the hardware is operated. Such improper specifications are generally called side-channel attacks. Therefore, when an encryption algorithm is incorporated into hardware, evaluation of the resistance against power analysis attacks (tamper resistance) becomes important in the design stage of the circuit. The present study proposes a new method for efficient verification of tamper resistance against power analysis attacks when designing a cryptography circuit. The validity of the proposed method is confirmed using design data of an experimentally produced chip of the advanced encryption standard (AES).},\n\tbooktitle = {2014 {International} {Conference} on {Computational} {Science} and {Computational} {Intelligence} ({CSCI})},\n\tauthor = {Yoshikawa, M. and Asai, T.},\n\tmonth = mar,\n\tyear = {2014},\n\tpages = {30--33}\n}\n\n","author_short":["Yoshikawa, M.","Asai, T."],"key":"yoshikawa_tamper_2014","id":"yoshikawa_tamper_2014","bibbaseid":"yoshikawa-asai-tamperresistanceverificationmethodforconsumersecurityproducts-2014","role":"author","urls":{},"downloads":0},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/ky25","creationDate":"2019-05-11T17:47:04.719Z","downloads":0,"keywords":[],"search_terms":["tamper","resistance","verification","method","consumer","security","products","yoshikawa","asai"],"title":"Tamper Resistance Verification Method for Consumer Security Products","year":2014,"dataSources":["XxiQtwZYfozhQmvGR"]}