Resilient AES Against Side-Channel Attack Using All-Spin Logic

被引:0
|
作者
Alasad, Qutaiba [1 ]
Yuan, Jiann [1 ]
Lin, Jie [1 ]
机构
[1] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The new generation of spintronic devices, Hybrid Spintronic-CMOS devices including Magnetic Tunnel Junction (MTJ), have been utilized to overcome Moore's law limitation as well as preserve higher performance with lower cost. However, implementing these devices as a hardware cryptosystem is vulnerable to side channel attacks (SCAs) due to the differential power at the output of the Hybrid Spintronic-CMOS device and asymmetric read/write operations in MTJ. One of the most severe SCAs is the power analysis attack (PAA), in which an attacker can observe the output current of the device and extract the secret key. In this paper, we employ the All Spin Logic Device (ASLD) to implement protected AES cryptography for the first time. More precisely, we realize that in additional to ASLD features, such as small area, non-volatile memory, high density and low operating voltage, this device has another unique feature: identical power dissipation through the switching operations. Such properties can be effectively leveraged to prevent SCA.
引用
收藏
页码:57 / 62
页数:6
相关论文
共 50 条
  • [31] Arithmetic Logic Unit based on All-Spin Logic Devices
    An, Qi
    Le Beux, Sebastien
    O'Connor, Ian
    Klein, Jacques Olivier
    Zhao, Weisheng
    2017 IEEE 15TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2017, : 317 - 320
  • [32] Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
    Brisfors, Martin
    Moraitis, Michail
    Dubrova, Elena
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 38 - 53
  • [33] Amplitude-modulated EM side-channel attack on provably secure masked AES
    Wang, Huanyu
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (03) : 537 - 549
  • [34] Galvanically Isolated, Power and Electromagnetic Side-Channel Attack Resilient Secure AES Core with Integrated Charge Pump based Power Management
    Wang, Meizhi
    Xie, Shanshan
    Li, Ping Na
    Sayal, Aseem
    Li, Ge
    Iyer, Vishnuvardhan V.
    Thimmaiah, Aditya
    Orshansky, Michael
    Yilmaz, Ali E.
    Kulkarni, Jaydeep P.
    2021 IEEE CUSTOM INTEGRATED CIRCUITS CONFERENCE (CICC), 2021,
  • [35] Side-channel attack on substitution blocks
    Novak, R
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 307 - 318
  • [36] SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
    Javier Hernandez-Castro, Carlos
    Ribagorda, Arturo
    Saez, Yago
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 59 - 65
  • [37] Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations
    Guo, Shize
    Zhao, Xinjie
    Zhang, Fan
    Wang, Tao
    Shi, Zhijie Jerry
    Standaert, Francois-Xavier
    Ma, Chujiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (06) : 999 - 1014
  • [38] USB side-channel attack on Tor
    Yang, Qing
    Gasti, Paolo
    Balagani, Kiran
    Li, Yantao
    Zhou, Gang
    COMPUTER NETWORKS, 2018, 141 : 57 - 66
  • [39] Cache Side-channel Attack to Recover Plaintext against Datagram TLS
    Tang, Ye
    Li, Huiyun
    Xu, Guoqing
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [40] Power Profile Equalizer: a Lightweight Countermeasure against Side-channel Attack
    Wang, Chenguang
    Yan, Ming
    Cai, Yici
    Zhou, Qiang
    Yang, Jianlei
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 305 - 312