Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Simon Hoerder is active.

Publication


Featured researches published by Simon Hoerder.


international conference information security theory and practice | 2011

An evaluation of hash functions on a power analysis resistant processor architecture

Simon Hoerder; Marcin Wójcik; Stefan Tillich; Daniel Page

Cryptographic hash functions are an omnipresent component in security-critical software and devices; they support digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criterion for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern especially for mobile devices. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight a flexible solution to power analysis attacks, implying only a modest performance overhead.


Proceedings of the Workshop on Embedded Systems Security | 2013

Light-weight primitive, feather-weight security: a cryptanalytic knock-out

Valentina Banciu; Simon Hoerder; Daniel Page

In [12], the authors present a new light-weight cryptographic primitive which supports an associated RFID-based authentication protocol. The primitive has some structural similarities to AES, but is presented as a keyed one-way function using a 128-bit key. Although a security analysis is included, this is at a high-level only. To provide a more concrete idea as to the security of this primitive, we therefore make three contributions: first, a structural attack requiring O(25) plaintext/ciphertext pairs (and hence effort online) plus O(221) effort offline, second algebraic attacks on round reduced versions of the primitive which requires only a single plaintext/ciphertext pair, and, third debunk the claimed attack of [36] on the same primitive. Our structural attack completely breaks the primitive and the algebraic attack highlights a crucial weakness of the primitive; we conclude that although one can consider countermeasures against these specific attacks, the design in general is questionable and should therefore be avoided.


Journal of Cryptographic Engineering | 2012

An exploration of mechanisms for dynamic cryptographic instruction set extension

Philipp Grabher; Johann Großschädl; Simon Hoerder; Kimmo Järvinen; Daniel Page; Stefan Tillich; Marcin Wójcik

Instruction set extensions (ISEs) supplement a host processor with special-purpose, typically fixed-function hardware components and instructions to utilise them. For cryptographic use-cases, this can be very effective due to the demand for non-standard or niche operations that are not supported by general-purpose architectures. However, one disadvantage of fixed-function ISEs is inflexibility, contradicting a need for “algorithm agility”. This paper explores a new approach, namely the provision of reconfigurable mechanisms to support dynamic (run-time changeable) ISEs. Our results, obtained using an FPGA-based LEON3 prototype, show that this approach provides a flexible general-purpose platform for cryptographic ISEs with all known advantages of previous work, but relies on careful analysis of the associated security issues.


workshop in information security theory and practice | 2013

On Secure Embedded Token Design

Simon Hoerder; Kimmo Järvinen; Daniel Page

Within a broader context of mobile and embedded computing, the design of practical, secure tokens that can store and/or process security-critical information remains an ongoing challenge. One aspect of this challenge is the threat of information leakage through side-channel attacks, which is exacerbated by any resource constraints. Along these lines, this paper extends previous work on use of Yao circuits via two contributions. First, we show how careful analysis can fix the maximum number of leakage occurrences observed during a DPA attack, effectively bounding leakage from a Yao-based token. To achieve this we use modularised Yao circuits, which also support our second contribution: the first Yao-based implementation of a secure authentication payload, namely HMAC based on SHA-256.


Archive | 2013

On secure embedded token design: Quasi-looped Yao circuits and bounded leakage

Simon Hoerder; Kimmo Järvinen; Daniel Page

Within a broader context of mobile and embedded computing, the design of practical, secure tokens that can store and/or process security-critical information remains an ongoing challenge. One aspect of this challenge is the threat of information leakage through side-channel attacks, which is exacerbated by any resource constraints. Along these lines, this paper extends previous work on use of Yao circuits via two contributions. First, we show how careful analysis can fix the maximum number of leakage occurrences observed during a DPA attack, effectively bounding leakage from a Yao-based token. To achieve this we use modularised Yao circuits, which also support our second contribution: the first Yao-based implementation of a secure authentication payload, namely HMAC based on SHA-256.


Lecture Notes in Computer Science | 2011

Workshop in Information Security Theory and Practice - WISTP 2013

Simon Hoerder; Kimmo Järvinen; Daniel Page

Within a broader context of mobile and embedded computing, the design of practical, secure tokens that can store and/or process security-critical information remains an ongoing challenge. One aspect of this challenge is the threat of information leakage through side-channel attacks, which is exacerbated by any resource constraints. Along these lines, this paper extends previous work on use of Yao circuits via two contributions. First, we show how careful analysis can fix the maximum number of leakage occurrences observed during a DPA attack, effectively bounding leakage from a Yao-based token. To achieve this we use modularised Yao circuits, which also support our second contribution: the first Yao-based implementation of a secure authentication payload, namely HMAC based on SHA-256.


publisher | None

title

author


IACR Cryptology ePrint Archive | 2013

Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results).

Valentina Banciu; Simon Hoerder; Dan Page


IACR Cryptology ePrint Archive | 2013

On secure embedded token design (Long Version) - Quasi-looped Yao circuits and bounded leakage.

Simon Hoerder; Kimmo Järvinen; Dan Page


Journal of Cryptographic Engineering | 2012

Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems

Roberto Maria Avanzi; Simon Hoerder; Dan Page; Michael Tunstall

Collaboration


Dive into the Simon Hoerder's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dan Page

University of Bristol

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stefan Tillich

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge