Let’s Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries

نویسندگان

چکیده

The wire probe-and-fault models are currently the most used to provide arguments for side-channel and fault security. However, several practical attacks not yet covered by these models. This work extends model include more advanced faults such as area permanent faults. Moreover, we show tile adversary from CRYPTO 2018’s CAPA envelops extended along with known extensions probing glitches, transitions, couplings. In other words, tiled (tessellated ) designs offer security guarantees even against probe adversaries. As use multi-party computation techniques, countermeasures typically expensive software/hardware. investigates a countermeasure based on ISW methodology which is shown perform significantly better than parameters.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unconditional Security Against Memory-Bounded Adversaries

We propose a private-key cryptosystem and a protocol for key agreement by public discussion that are unconditionally secure based on the sole assumption that an adversary's memory capacity is limited. No assumption about her computing power is made. The scenario assumes that a random bit string of length slightly larger than the adversary's memory capacity can be received by all parties. The ra...

متن کامل

An Efficient Heuristic Approach for Security Against Multiple Adversaries

In adversarial multiagent domains, security, commonly defined as the ability to deal with intentional threats from other agents, is a critical issue. This paper focuses on domains where these threats come from unknown adversaries. These domains can be modeled as Bayesian games; much work has been done on finding equilibria for such games. However, it is often the case in multiagent security dom...

متن کامل

On the Security of Symmetric Key Ciphers against Quantum Adversaries

Our trust in specific symmetric primitives relies on their ability to resist all known cryptanalytic attacks. Therefore, cryptanalysis is the only proper way to evaluate their security. In this paper, we investigate the behavior of symmetric primitives in the quantum world. This requires to extend the toolkit of symmetric cryptanalysis to the quantum setting, eventually including new attacks. W...

متن کامل

Improving Resource Allocation Strategy against Human Adversaries in Security Games

Recent real-world deployments of Stackelberg security games make it critical that we address human adversaries’ bounded rationality in computing optimal strategies. To that end, this paper provides three key contributions: (i) new efficient algorithms for computing optimal strategic solutions using Prospect Theory and Quantal Response Equilibrium; (ii) the most comprehensive experiment to date ...

متن کامل

Security of ECQV-Certified ECDSA Against Passive Adversaries

We show that the elliptic curve Qu-Vanstone implicit certificate scheme (ECQV), when composed with the Elliptic Curve Digital Signature Algorithm (ECDSA), is secure against passive adversaries under the combined assumption of the random oracle model and the generic group model. In contrast, we detail an attack on the composition of another implicit certificate scheme, proposed by Pintsov and Va...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-68487-7_12