Skip to Main Content
Communication Architectures for Systems-on-Chip
book

Communication Architectures for Systems-on-Chip

by José L. Ayala
September 2018
Intermediate to advanced content levelIntermediate to advanced
449 pages
13h 16m
English
CRC Press
Content preview from Communication Architectures for Systems-on-Chip
Security Issues in SoC Communication 343
8.2.7 Attacks on Masking
In a masked implementation, all intermediate values that are computed during
the execution of a cryptographic algorithm are concealed by a random value,
which is called mask. This ensures, if correctly implemented, a pairwise inde-
pendence between masked values, unmasked values, and masks. Hence, only
if pairwise independence does not hold for some reason, a masking scheme is
vulnerable to DPA attacks. DPA attacks based on one intermediate value that
is predicted are referred to as first-order DPA attacks, and they do not work
to attack perfect mask schemes.
As previously seen, higher-order DPA attacks exploit the joint leakage of
several intermediate values. In practice, second-order ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Autonomic Networking-on-Chip

Autonomic Networking-on-Chip

Phan Cong-Vinh
On-Chip Communication Architectures

On-Chip Communication Architectures

Sudeep Pasricha, Nikil Dutt
Networks on Chips

Networks on Chips

Giovanni De Micheli, Luca Benini, Davide Bertozzi, Israel Cidon, Kees Goossens, Kwanho Kim, Kangmin Lee, Se-Joong Lee, Srinivasan Murali, Hoi-Jun Yoo

Publisher Resources

ISBN: 9781439841716