Fundamental Study on Randomized Processing in Cryptographic IC Using Variable Clock against Correlation Power Analysis

被引:0
|
作者
Saito, Megumi [1 ]
Mizuki, Takaaki [1 ]
Sone, Hideaki [1 ]
Hayashi, Yu-ichi [2 ]
机构
[1] Tohoku Univ, Sendai, Miyagi, Japan
[2] Tohoku Gakuin Univ, Tagajo, Miyagi, Japan
来源
2015 10TH INTERNATIONAL WORKSHOP ON THE ELECTROMAGNETIC COMPATIBILITY OF INTEGRATED CIRCUITS | 2015年
关键词
Cryptographic IC; EM information leakage; Side-channel attack; INFORMATION LEAKAGE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Correlation Power Analysis (CPA) is one of the typical side-channel analyses targeting cryptographic IC. CPA calculates the Poisson correlation function between transient currents (which are generated from a cryptographic IC depending on the processed data) and hypothetical current values and then recovers the secret key from a high number of correlation computations. Countermeasures against side-channel attacks mainly focus on algorithms and architecture at the design levels. These methods suffer from some problems, e.g., increase in processing time and circuit scale. This paper discusses a countermeasure against CPA, which can be relatively inexpensively and easily implemented. CPA calculates the correlation value between the transient current waveforms and hypothetical current values under the assumption that the specific process that leaks the secret key information is always performed after a certain time from the time when the cryptographic IC starts performing encryption or decryption and recovers the secret key. Therefore, we consider the possibility of randomizing the time when a cryptographic IC runs the process where the secret key information is leaked to suppress the leakage of side-channel information available in recovering the secret key. In this paper, we propose a method of changing the clock frequencies for each encryption or decryption to randomize the time. In our experiment, we employed Side-channel Attack Standard Evaluation Board (SASEBO-G) and implemented Advanced Encryption Standard (AES) on a field-programmable gate array (FPGA) of SASEBO-G. We measured the transient currents in a cryptographic FPGA that was supplied a spread-spectrum clock while it performs AES encryption. We calculated the correlation value between each transient current waveform and a hypothetical current value and demonstrated that this process is effective as a countermeasure against CPA.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 12 条
  • [1] Power model analysis using variable rate clock network in CMOS processor
    Titus, T. Joby
    Vijayakumari, V.
    Saranya, B.
    Devi, V. S. Sanjana
    7TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT 2016), 2016,
  • [2] Accelerating Correlation Power Analysis Using Graphics Processing Units (GPUs)
    Gamaarachchi, Hasindu
    Ragel, Roshan
    Jayasinghe, Darshana
    2014 7TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS), 2014,
  • [3] Analysis of Countermeasures Against Remote and Local Power Side Channel Attacks using Correlation Power Analysis
    Mozipo, Aurelien T.
    Acken, John M.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5128 - 5142
  • [4] Fundamental Study on Simple Power Analysis Using Backscattering from Switching Regulators
    Kitazawa, Taiki
    Fujimoto, Daisuke
    Hayashi, Yuichi
    2024 INTERNATIONAL SYMPOSIUM AND EXHIBITION ON ELECTROMAGNETIC COMPATIBILITY, EMC EUROPE 2024, 2024, : 22 - 26
  • [5] Design-Based Fingerprinting Using Side-Channel Power Analysis For Protection Against IC Piracy
    Shey, James
    Karimi, Naghmeh
    Robucci, Ryan
    Patel, Chintan
    2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 614 - 619
  • [6] Fundamental Study on Ultrasonic Measurement System to Detect Penetration of Boulders Using Auto-correlation Analysis
    Kawamura, Youhei
    Tsurushima, Mamoru
    Aoshima, Nobuharu
    Mizutani, Koichi
    IECON 2004: 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL 2, 2004, : 1795 - 1798
  • [7] An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor
    Lee, Jen-Wei
    Chung, Szu-Chi
    Chang, Hsie-Chia
    Lee, Chen-Yi
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 548 - 564
  • [8] Electric-energy generation using variable-capacitive resonator for power-free LSI: Efficiency analysis and fundamental experiment
    Miyazaki, M
    Tanaka, H
    Ono, G
    Nagano, T
    Ohkubo, N
    Kawahara, T
    Yano, K
    ISLPED'03: PROCEEDINGS OF THE 2003 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, 2003, : 193 - 198
  • [9] Efficient Power-Analysis-Resistant Dual-Field Elliptic Curve Cryptographic Processor Using Heterogeneous Dual-Processing-Element Architecture
    Lee, Jen-Wei
    Chung, Szu-Chi
    Chang, Hsie-Chia
    Lee, Chen-Yi
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (01) : 49 - 61
  • [10] Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Cores with Countermeasures
    Fujimoto, Daisuke
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yuichi
    Homma, Naofumi
    Aoki, Takafumi
    Hori, Yohei
    Katashita, Toshihiro
    Sakiyama, Kazuo
    Thanh-Ha Le
    Bringer, Julien
    Bazargan-Sabet, Pirouz
    Bhasin, Shivam
    Danger, Jean-Luc
    2014 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, TOKYO (EMC'14/TOKYO), 2014, : 306 - 309