A Methodology for the Characterisation of Leakages in Combinatorial Logic

Guido Bertoni, Marco Martinoli*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Abstract

Glitches represent a great danger for hardware implementations of cryptographic schemes. Their intrinsic random nature makes them difficult to tackle and their occurrence threatens side-channel protections. Although countermeasures aiming at structurally solving the problem already exist, they usually require some effort to be applied or introduce non-negligible overhead in the design. Our work addresses the gap between such countermeasures and the naïve implementation of schemes being vulnerable in the presence of glitches. Our contribution is twofold: (1) we expand the mathematical framework proposed by Brzozowski and Ésik (FMSD 2003) by meaningfully adding the notion of information leakage, (2) thanks to which we define a formal methodology for the analysis of vulnerabilities in combinatorial circuits when glitches are taken into account.
Original languageEnglish
Title of host publicationSecurity, Privacy, and Applied Cryptography Engineering
Subtitle of host publication6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings
PublisherSpringer Verlag
Pages363-382
Number of pages20
ISBN (Electronic)9783319494456
ISBN (Print)9783319494449
DOIs
Publication statusPublished - 18 Nov 2016
Event6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016 - Hyderabad, India
Duration: 14 Dec 201618 Dec 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer
Volume10076
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016
CountryIndia
CityHyderabad
Period14/12/1618/12/16

Keywords

  • Formal method
  • Glitches
  • Hardware countermeasures
  • Side-channel analysis

Fingerprint Dive into the research topics of 'A Methodology for the Characterisation of Leakages in Combinatorial Logic'. Together they form a unique fingerprint.

  • Cite this

    Bertoni, G., & Martinoli, M. (2016). A Methodology for the Characterisation of Leakages in Combinatorial Logic. In Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings (pp. 363-382). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10076). Springer Verlag. https://doi.org/10.1007/978-3-319-49445-6_21