Abstract
A new approach for authentication, side-channel authentication, has been proposed. In side-channel authentication, the authenticity of the device is confirmed with high accuracy by using electromagnetic radiation from the device and response in the conventional challenge–response authentication. The side-channel model or profiled template is used as one of the inputs of the distinguisher when authenticated. The performance of side-channel authentication is greatly affected by the precision of the model or template. In this paper, we evaluate the authentication performance when using profile- and non-profile-based HD models and a profile-based XOR model. We report the results of the experiment in detail using FPGA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
AES can be replaced with other symmetric-key ciphers.
- 2.
The intermediate values influenced by a biased plaintext are not used.
References
Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: Network & Distributed System Security, NDSS. The Internet Society (2011)
Global trade in fake goods worth nearly half a trillion dollars a year - OECD & EUIPO. http://www.oecd.org/industry/global-trade-in-fake-goods-worth-nearly-half-a-trillion-dollars-a-year.htm. Accessed 8 Aug 2017
Ravikanth, P.S.: Physical one-way functions. Ph.D. thesis, Cambridge, MA, USA (2001). AAI0803255
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual Design Automation Conference, DAC 2007, pp. 9–14. ACM (2007)
Sakiyama, K., Kasuya, M., Machida, T., Matsubara, A., Kuai, Y., Hayashi, Y., Mizuki, T., Miura, N., Nagata, M.: Physical authentication using side-channel information. In: Proceedings of the 4th International Conference on Information and Communication Technology, ICoICT 2016 (2016)
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44709-1_21
De Mulder, E., Örs, S.B., Preneel, B., Verbauwhede, I.: Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. Comput. Electr. Eng. 33, 367–382 (2007)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 296–310 (2007)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_2
Clavier, C., Danger, J.-L., Duc, G., Elaabid, M.A., Gérard, B., Guilley, S., Heuser, A., Kasper, M., Li, Y., Lomné, V., Nakatsu, D., Ohta, K., Sakiyama, K., Sauvage, L., Schindler, W., Stöttinger, M., Veyrat-Charvillon, N., Walle, M., Wurcker, A.: Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4), 259–274 (2014)
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_30
Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS 2007, pp. 7:1–7:16 (2007)
DPA Contest v2 Hall of Fame. http://www.dpacontest.org/v2/. Accessed 8 Aug 2017
DE0-Nano Development and Education Board. http://www.terasic.com.tw/en. Accessed 8 Aug 2017
Acknowledgments
This work was supported by Japan Society for the Promotion of Science (JSPS) Grants-in-Aid for Scientific Research (KAKENHI) Grant Numbers 15K12035.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Kasuya, M., Sakiyama, K. (2018). Improved EM Side-Channel Authentication Using Profile-Based XOR Model. In: Kang, B., Kim, T. (eds) Information Security Applications. WISA 2017. Lecture Notes in Computer Science(), vol 10763. Springer, Cham. https://doi.org/10.1007/978-3-319-93563-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-93563-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93562-1
Online ISBN: 978-3-319-93563-8
eBook Packages: Computer ScienceComputer Science (R0)