This research investigates the resistance of the multi-threaded countermeasure to side channel analysis (SCA) attacks. The multi-threaded countermeasure is attacked using the Correlation Power Analysis (CPA) and template attacks. Additionally, it is compared to the existing hiding countermeasure. Furthermore, additional signal processing techniques are used to increase the attack success ratio. It is demonstrated that the multi-threaded countermeasure is able to outperform the existing countermeasures by withstanding the CPA and template attacks. Furthermore, the multi-threaded countermeasure is unaffected by the elastic alignment and filtering techniques as opposed to the existing countermeasures. The research concludes that the multithreaded countermeasure is indeed a secure implementation to mitigate SCA attacks.
Reference:
Frieslaar, I. and Irwin, B. 2016. Evaluating the multi-threading countermeasure. International Journal of Computer Science and Information Security (IJCSIS), vol. 14(12): 379-387
Frieslaar, I., & Irwin, B. (2016). Evaluating the multi-threading countermeasure. http://hdl.handle.net/10204/9041
Frieslaar, Ibraheem, and B Irwin "Evaluating the multi-threading countermeasure." (2016) http://hdl.handle.net/10204/9041
Frieslaar I, Irwin B. Evaluating the multi-threading countermeasure. 2016; http://hdl.handle.net/10204/9041.