Fresh re-keying: security against side-channel and fault attacks for low-cost devices

  • Authors:
  • Marcel Medwed;François-Xavier Standaert;Johann Großschädl;Francesco Regazzoni

  • Affiliations:
  • Graz University of Technology, Austria;Université catholique de Louvain, Belgium;University of Luxembourg, Luxembourg;Université catholique de Louvain, Belgium

  • Venue:
  • AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-preserving applications. In this context, RFID tags need to be protected against physical attacks such as Differential Power Analysis (DPA) and fault attacks. The main obstacles towards secure RFID are the extreme constraints of passive tags in terms of power consumption and silicon area, which makes the integration of countermeasures against physical attacks even more difficult than for other types of embedded systems. In this paper we propose a fresh re-keying scheme that is especially suited for challenge-response protocols such as used to authenticate tags. We evaluate the resistance of our scheme against fault and side-channel analysis, and introduce a simple architecture for VLSI implementation. In addition, we estimate the cost of our scheme in terms of area and execution time for various security/performance trade-offs. Our experimental results show that the proposed re-keying scheme provides better security (and does so at less cost) than state-of-the-art countermeasures.