Evolvable Hardware Architectures on FPGA for Side-Channel Security

被引:1
|
作者
Labafniya, Mansoureh [1 ]
Borujeni, Shahram Etemadi [1 ]
Mentens, Nele [2 ,3 ,4 ]
机构
[1] Univ Isfahan, Esfahan, Iran
[2] Leiden Univ, LIACS, Leiden, Netherlands
[3] Katholieke Univ Leuven, ESAT, ES&S, Leuven, Belgium
[4] Imec COSIC, Leuven, Belgium
关键词
Evolvable Hardware; Virtual reconfigurable circuit; Differential Power Analysis (DPA); Field-Programmable Gate Array (FPGA);
D O I
10.1007/978-3-030-61638-0_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes the use of Evolvable Hardware (EH) architectures as a countermeasure against power analysis attacks. It is inspired by the work of Sasdrich et al., in which the block cipher PRESENT is protected against power analysis attacks through the use of dynamic logic FPGA reconfiguration. The countermeasure consists of splitting the substitution boxes (S-boxes) into two parts with a register in between; the way the S-boxes are split is random and is altered before each new execution of the block cipher. This makes it very difficult (or even impossible) for an attacker to perform a Differential Power Analysis (DPA) attack by collecting many power traces of the same implementation. Whereas the approach of Sasdrich et al. requires the external computation and communication of new configurations, our approach computes new configurations on the fly with an on-chip configuration generator based on evolutionary algorithms. This reduces the risk of an adversary tampering with the configuration data and takes away the communication delay. Our work is the first to propose the use of EH and Genetic Programming (GP) for this type of countermeasure. More precisely, we explore two methods, Genetic Programming (GP) and Cartesian Genetic Programming (CGP) and we evaluate the feasibility of these methods by measuring the overhead in terms of delay and resource occupation for the block ciphers PRESENT and PRINTcipher.
引用
下载
收藏
页码:163 / 180
页数:18
相关论文
共 50 条
  • [21] Side-channel issues for designing secure hardware implementations
    Batina, L
    Mentens, N
    Verbauwhede, I
    11TH IEEE INTERNATIONAL ON-LINE TESTING SYMPOSIUM, 2005, : 118 - 121
  • [22] SCAR-FPGA: A NOVEL SIDE-CHANNEL ATTACK RESISTANT FPGA
    Mokari, Ali
    Ghavami, Behnam
    Pedram, Hossein
    2009 5TH SOUTHERN CONFERENCE ON PROGRAMMABLE LOGIC, PROCEEDINGS, 2009, : 177 - 182
  • [23] Power Side-Channel Analysis for Different Adders on FPGA
    Zhao, Yilin
    Zhang, Qidi
    Nishikawa, Hiroki
    Kong, Xiangbo
    Tomiyama, Hiroyuki
    18TH INTERNATIONAL SOC DESIGN CONFERENCE 2021 (ISOCC 2021), 2021, : 367 - 368
  • [24] Side-Channel Attack Analysis on In-Memory Computing Architectures
    Wang, Ziyu
    Meng, Fan-Hsuan
    Park, Yongmo
    Eshraghian, Jason K.
    Lu, Wei D.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (01) : 109 - 121
  • [25] A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber
    Ji, Yanning
    Wang, Ruize
    Ngo, Kalle
    Dubrova, Elena
    Backlund, Linus
    2023 IEEE EUROPEAN TEST SYMPOSIUM, ETS, 2023,
  • [26] Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses
    Chen, Sanchuan
    Liu, Fangfei
    Mi, Zeyu
    Zhang, Yinqian
    Lee, Ruby B.
    Chen, Haibo
    Wang, XiaoFeng
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 601 - 608
  • [27] SCCA: Side-Channel Correlation Analysis for Detecting Hardware Trojan
    Liu, Yanjiang
    Zhao, Yiqiang
    He, Jiaji
    Liu, Aqiang
    Xin, Ruishan
    PROCEEDINGS OF 2017 11TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2017, : 196 - 200
  • [28] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [29] Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware
    Steffen, Hauke
    Land, Georg
    Kogelheide, Lucie
    Gueneysu, Tim
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 688 - 711
  • [30] Hardware Trojan Detection Techniques Using Side-Channel Analysis
    Thi-Tam Hoang
    Thai-Ha Tran
    Van-Phuc Hoang
    Xuan-Nam Tran
    Cong-Kha Pham
    PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 528 - 533