Tamper resistant crypto implementations
The protection goals confidentiality, data integrity and authenticity can be realized with the help of cryptographic algorithms. To achieve this, it is essential to keep the used keys secret. Although these can possibly be determined by analyzing physical parameters such as energy consumption or electromagnetic radiation of the implementations, well known as side-channel-attacks. Especially if the devices are physically unprotected, these attacks are relevant, e.g. for critical infrastructures. In order to prevent this, different methods of attack are investigated, i.e. statistical and AI based methods for the extraction of keys from measured values. For this, a suitable measurement lab including a laser station for fault injections is available. Based on the knowledge gained in this way, the implementations are hardened against such attacks. The goal is to develop a corresponding design methodology. The results achieved so far have been incorporated in numerous publications and 10 granted patents.