Design Techniques for Side-channel Resistant Embedded Software

dc.contributor.authorSinha, Ambuj Sudhiren
dc.contributor.committeechairSchaumont, Patrick R.en
dc.contributor.committeememberShukla, Sandeep K.en
dc.contributor.committeememberHsiao, Michael S.en
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2014-03-14T20:43:09Zen
dc.date.adate2011-08-25en
dc.date.available2014-03-14T20:43:09Zen
dc.date.issued2011-08-05en
dc.date.rdate2011-08-25en
dc.date.sdate2011-08-10en
dc.description.abstractSide Channel Attacks (SCA) are a class of passive attacks on cryptosystems that exploit implementation characteristics of the system. Currently, a lot of research is focussed towards developing countermeasures to side channel attacks. In this thesis, we address two challenges that are an inherent part of the efficient implementation of SCA countermeasures. While designing a system, design choices made for enhancing the efficiency or performance of the system can also affect the side channel security of the system. The first challenge is that the effect of different design choices on the side channel resistance of a system is currently not well understood. It is important to understand these effects in order to develop systems that are both secure and efficient. A second problem with incorporating SCA countermeasures is the increased design complexity. It is often difficult and time consuming to integrate an SCA countermeasure in a larger system. In this thesis, we explore that above mentioned problems from the point of view of developing embedded software that is resistant to power based side channel attacks. Our first work is an evaluation of different software AES implementations, from the perspective of side channel resistance, that shows the effect of design choices on the security and performance of the implementation. Next we present work that identifies the problems that arise while designing software for a particular type of SCA resistant architecture - the Virtual Secure Circuit. We provide a solution in terms of a methodology that can be used for developing software for such a system - and also demonstrate that this methodology can be conveniently automated - leading to swifter and easier software development for side channel resistant designs.en
dc.description.degreeMaster of Scienceen
dc.identifier.otheretd-08102011-151100en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-08102011-151100/en
dc.identifier.urihttp://hdl.handle.net/10919/34465en
dc.publisherVirginia Techen
dc.relation.haspartSinha_AS_T_2011.pdfen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectBitslice Cryptographyen
dc.subjectSide Channel Attacksen
dc.subjectVirtual Secure Circuiten
dc.subjectSecure Embedded Systemsen
dc.subjectSide-channel Countermeasuresen
dc.titleDesign Techniques for Side-channel Resistant Embedded Softwareen
dc.typeThesisen
thesis.degree.disciplineElectrical and Computer Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Sinha_AS_T_2011.pdf
Size:
8.16 MB
Format:
Adobe Portable Document Format

Collections