LI Hong, HE Zhang-qing, XU Yuan-zhong. An Efficient Processor Architecture to Resist Side Channel Attacks[J]. Microelectronics & Computer, 2016, 33(5): 6-9, 14.
Citation: LI Hong, HE Zhang-qing, XU Yuan-zhong. An Efficient Processor Architecture to Resist Side Channel Attacks[J]. Microelectronics & Computer, 2016, 33(5): 6-9, 14.

An Efficient Processor Architecture to Resist Side Channel Attacks

  • In this article, based on random delay insertion, an effective processor architecture resistant to side-channel attacks was proposed. It used a combination of randomized scheduling, randomized instruction insertion and randomized pipeline-delay to resist side-channel attacks. On the base of ARM7 processor, we implemented this architecture and the implementation results showed that this processor has increased approximate 20% in hardware area than the original ARM7 processor. The CPA attack experiment results suggested that our new secure processor have high capacity to resist side-channel attacks and thus could be used in USBKEY, Smart CARD and other application scenarios which require extremely high security level.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return