Conference paper Open Access

A Methodology for the Characterization of Leakages in Combinatorial Logic

Guido Bertoni; Marco Martinoli

Glitches  represent  a  great  danger  for  hardware  implementations of cryptographic schemes. Their intrinsic random nature makes them difficult to tackle and their occurrence threatens side-channel protections.  Although  countermeasures  aiming  at  structurally  solving  the problem  already  exist,  they  usually  require  some  effort  to  be  applied or introduce non-negligible overhead in the design. Our work addresses the gap between such countermeasures and the na ive implementation of schemes being vulnerable in the presence of glitches. Our contribution is twofold: (1) we expand the mathematical framework proposed by Brzozowski and Esik (FMSD 2003) by meaningfully adding the notion of information leakage, (2) thanks to which we define a formal methodology for the analysis of vulnerabilities in combinatorial circuits when glitches are taken into account.

Files (935.5 kB)
Name Size
HECTOR-A-methodology-combinatorial-logic-STI.pdf
md5:d5a6814bccb9fea0ac1fb6de99001f66
935.5 kB Download
23
1
views
downloads
All versions This version
Views 2323
Downloads 11
Data volume 935.5 kB935.5 kB
Unique views 2323
Unique downloads 11

Share

Cite as