Embedded Randomness and Data Dependencies Design Paradigm: Advantages and Challenges
Itamar Levia, Yehuda Rudinb, Alexander Fishc and Osnat Kerend
Faculty of Engineering, Bar‐Ilan University, Ramat-Gan, Israel
aitamar.levi@biu.ac.il
byehuda.rudin@biu.ac.il
calexander.fish@biu.ac.il
dosnat.keren@biu.ac.il
ABSTRACT
Information leakage through physical channels is a major hurdle in embedded hardware security. This paper overviews the three key factors in the embedded hardware security space, focusing on gray‐box (bounded resources) power analysis attacks: the adversary's knowledge and abilities, the security metrics used by adversaries' and security evaluators and gate‐level countermeasures. A new design paradigm, dubbed
Keywords: Hardware security, Information leakage, pAsynch, Pseudo asynchronous, Side channel.