On Secure Embedded Token Design

Abstract : Within a broader context of mobile and embedded computing, the design of practical, secure tokens that can store and/or process security-critical information remains an ongoing challenge. One aspect of this challenge is the threat of information leakage through side-channel attacks, which is exacerbated by any resource constraints. Along these lines, this paper extends previous work on use of Yao circuits via two contributions. First, we show how careful analysis can fix the maximum number of leakage occurrences observed during a DPA attack, effectively bounding leakage from a Yao-based token. To achieve this we use modularised Yao circuits, which also support our second contribution: the first Yao-based implementation of a secure authentication payload, namely HMAC based on SHA-256.
Type de document :
Communication dans un congrès
Lorenzo Cavallaro; Dieter Gollmann. 7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. Springer, Lecture Notes in Computer Science, LNCS-7886, pp.112-128, 2013, Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems. 〈10.1007/978-3-642-38530-8_8〉
Liste complète des métadonnées

Littérature citée [28 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01485937
Contributeur : Hal Ifip <>
Soumis le : jeudi 9 mars 2017 - 15:16:22
Dernière modification le : jeudi 9 mars 2017 - 15:21:21
Document(s) archivé(s) le : samedi 10 juin 2017 - 14:41:07

Fichier

978-3-642-38530-8_8_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Simon Hoerder, Kimmo Järvinen, Daniel Page. On Secure Embedded Token Design. Lorenzo Cavallaro; Dieter Gollmann. 7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. Springer, Lecture Notes in Computer Science, LNCS-7886, pp.112-128, 2013, Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems. 〈10.1007/978-3-642-38530-8_8〉. 〈hal-01485937〉

Partager

Métriques

Consultations de la notice

31

Téléchargements de fichiers

18