1. Rekeying-based Moving Target Defence Mechanism for Side-Channel Attacks
- Author
-
Satyanarayana Vuppala, Alie El-Din Mady, and Adam Kuenzi
- Subjects
Attack model ,business.industry ,Computer science ,Scalability ,Cyber-physical system ,Rekeying ,Synchronizing ,Side channel attack ,business ,Encryption ,Computer network - Abstract
In this paper, we present a side-channel resilient moving target defence mechanism against power-/electromagnetic-based side-channel attacks. Recent countermeasures use fresh re-keying after every encryption/decryption process; this causes major overhead in synchronizing the communicating parties. In contrast to prior work, our mechanism integrates fresh re-keying and masking techniques at an interval, where these techniques are driven by the maximum number of side-channel leakage traces required towards a successful embedded attack. Hence, the mechanism tracks the effect of attacks on the number of traces, and consequently applies re-keying at suitable intervals to reduce the computational/communication overhead, while increasing the attack cost. The mechanism scalability was evaluated against an advanced attack model based on machine learning methods that reduces significantly the number of traces required for a successful attack under masking implementation.
- Published
- 2019
- Full Text
- View/download PDF