scholarly journals CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes

Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 13
Author(s):  
Ehsan Aerabi ◽  
David Hély ◽  
Cyril Bresch ◽  
Athanasios Papadimitriou ◽  
Mahdi Fazeli

CONFISCA is the first generic SIMD-based software countermeasure that can concurrently resist against Side-Channel Attack (SCA) and Fault Injection (FI). Its promising strength is presented in a PRESENT cipher case study and compared to software-based Dual-rail with Pre-charge Logic concurrent countermeasure. It has lower overhead, wider usability, and higher protection. Its protection has been compared using Correlation Power Analysis, Welch’s T-Test, Signal-to-Noise Ratio and Normalized Inter-Class Variance testing methods. CONFISCA can on-the-fly switch between its two modes of operation: The High-Performance and High-Security by having only one instance of the cipher. This gives us the flexibility to trade performance/energy with security, based on the actual critical needs.

2021 ◽  
Vol 16 (1) ◽  
pp. 1-13
Author(s):  
Yu Zhou ◽  
Jianyong Hu ◽  
Xudong Miao ◽  
Yu Han ◽  
Fuzhong Zhang

Abstract The notion of the confusion coefficient is a property that attempts to characterize confusion property of cryptographic algorithms against differential power analysis. In this article, we establish a relationship between the confusion coefficient and the autocorrelation function for any Boolean function and give a tight upper bound and a tight lower bound on the confusion coefficient for any (balanced) Boolean function. We also deduce some deep relationships between the sum-of-squares of the confusion coefficient and other cryptographic indicators (the sum-of-squares indicator, hamming weight, algebraic immunity and correlation immunity), respectively. Moreover, we obtain some trade-offs among the sum-of-squares of the confusion coefficient, the signal-to-noise ratio and the redefined transparency order for a Boolean function.


2021 ◽  
Vol 9 ◽  
Author(s):  
Zahra Sobhani ◽  
Yunlong Luo ◽  
Christopher T. Gibson ◽  
Youhong Tang ◽  
Ravi Naidu ◽  
...  

As an emerging contaminant, microplastic is receiving increasing attention. However, the contamination source is not fully known, and new sources are still being identified. Herewith, we report that microplastics can be found in our gardens, either due to the wrongdoing of leaving plastic bubble wraps to be mixed with mulches or due to the use of plastic landscape fabrics in the mulch bed. In the beginning, they were of large sizes, such as > 5 mm. However, after 7 years in the garden, owing to natural degradation, weathering, or abrasion, microplastics are released. We categorize the plastic fragments into different groups, 5 mm–0.75 mm, 0.75 mm–100 μm, and 100–0.8 μm, using filters such as kitchenware, meaning we can collect microplastics in our gardens by ourselves. We then characterized the plastics using Raman image mapping and a logic-based algorithm to increase the signal-to-noise ratio and the image certainty. This is because the signal-to-noise ratio from a single Raman spectrum, or even from an individual peak, is significantly less than that from a spectrum matrix of Raman mapping (such as 1 vs. 50 × 50) that contains 2,500 spectra, from the statistical point of view. From the 10 g soil we sampled, we could detect the microplastics, including large (5 mm–100 μm) fragments and small (<100 μm) ones, suggesting the degradation fate of plastics in the gardens. Overall, these results warn us that we must be careful when we do gardening, including selection of plastic items for gardens.


Electronics ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 240 ◽  
Author(s):  
Yuanyuan Zhang ◽  
Ning Wu ◽  
Fang Zhou ◽  
Jinbao Zhang ◽  
Muhammad Yahya

Differential power analysis (DPA) is an effective side channel attack method, which poses a critical threat to cryptographic algorithms, especially lightweight ciphers such as SIMON. In this paper, we propose an area-efficient countermeasure against DPA on SIMON based on the power randomization. Firstly, we review and analyze the architecture of SIMON algorithm. Secondly, we prove the threat of DPA attack to SIMON by launching actual DPA attack on SIMON 32/64 circuit. Thirdly, a low-cost power randomization scheme is proposed by combining fault injection with double rate technology, and the corresponding circuit design is implemented. To the best of our knowledge, this is the first scheme that applies the combination of fault injection and double rate technology to the DPA-resistance. Finally, the t-test is used to evaluate the security mechanism of the proposed designs with leakage quantification. Our experimental results show that the proposed design implements DPA-resistance of SIMON algorithm at certain overhead the cost of 47.7% LUTs utilization and 39.6% registers consumption. As compared to threshold implementation and bool mask, the proposed scheme has greater advantages in resource consumption.


Geophysics ◽  
2009 ◽  
Vol 74 (6) ◽  
pp. V133-V141 ◽  
Author(s):  
J. Wang ◽  
F. Tilmann ◽  
R. S. White ◽  
P. Bordoni

Hydraulic fracture-induced microseismic events in producing oil and gas fields are usually small, and noise levels are high at the surface as a result of the heavy equipment in use. Similarly, in nonhydrocarbon settings, arrays for detecting local earthquakes will benefit from reduced noise levels and the ability to detect smaller events will be increased. We propose a frequency-dependent multichannel Wiener filtering technique with linear constraints that uses an adaptive least-squares method to remove coherent noise in seismic array data. The noise records on several reference channels are used to predict the noise on a primary channel and then can be subtracted from the observed data. On a test with an unconstrained version of this filter, maximal noise suppression leads to signal distortion. Two methods of im-posing constraints then achieve signal preservation. In one case study, synthetic signals are added to noise from a pilot deployment of a hexagonal array (nine three-component seismometers, approximately [Formula: see text]) above a gas field; noise levels are suppressed by up to [Formula: see text] (at [Formula: see text]). In a second case study, natural seismicity recorded at a dense array ([Formula: see text] spacing) in Italy is used, where the application of the filter improves the signal-to-noise ratio (S/N) more than [Formula: see text] (at [Formula: see text]) using 35 stations. In both cases, the performance of the multichannel Wiener filters is significantly better than stacking, espe-cially at lower frequencies where stacking does not help to suppress the coherent noise. The unconstrained version of the filter yields the best improvement in signal-to-noise ratio, but the constrained filter is useful when waveform distortion is unacceptable.


2020 ◽  
Vol 31 (1) ◽  
pp. 17-25

Side channel attacks (SCAs) are now a real threat to cryptographic devices and correlation power analysis (CPA) is the most powerful attack. So far, a CPA attack usually exploits the leakage information from raw power consumption traces that collected from the attack device. In real attack scenarios, these traces collected from measurement equipment are usually contaminated by noise resulting in a decrease in attack efficiency. In this paper, we propose a variant CPA attack that exploits the leakage information from intrinsic mode functions (IMFs) of the power traces. These IMFs are the results of the variational mode decomposition (VMD) process on the raw power traces. This attack technique decreases the number of power traces for correctly recovering the secret key by approximately 13% in normal conditions and 60% in noisy conditions compared to a traditional CPA attack. Experiments were performed on power traces of AES-128 implemented in both microcontroller and FPGA by Sakura-G/W side channel evaluation board to verify the effectiveness of our method.


1991 ◽  
Vol 37 (2) ◽  
pp. 196-199 ◽  
Author(s):  
Gɒnther Strobel ◽  
HelmuT Weicker

Abstract A method is described to measure catecholamine sulfates from human plasma and urine by isocratic reversed-phase high-performance liquid chromatography with electrochemical detection. For this measurement we use catecholamine 3-sulfate isomers as internal standards and determine the sulfoconjugates only after eliminating the catecholamines. Catecholamines that have previously been used as internal standards are shown to cause a significant overestimation (P less than 0.05) of the catecholamine sulfates--by 10% to 25% and 20% to 42% in human plasma and urine, respectively. The detection limits (signal-to-noise ratio greater than 3) in plasma and urine samples were about 80 pmol/L for each analyte. The intra-assay and interassay CVs were less than 4.0% and 10.6% in human plasma and less than 6.6% and 12.8% in human urine, respectively. The calibration curves for all catecholamine sulfates in human plasma and urine were linear (r greater than 0.96; P less than 0.001) over the respective concentration ranges of 0.1-100 nmol/L and 5-1000 nmol/L.


Sign in / Sign up

Export Citation Format

Share Document