Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks

被引:0
|
作者
Zooker, David [1 ]
Elkoni, Matan [1 ]
Shalom, Or Ohev [1 ]
Weizman, Yoav [1 ]
Levi, Itamar [1 ]
Keren, Osnat [1 ]
Fish, Alexander [1 ]
机构
[1] Bar Ilan Univ, Fac Engn, Ramat Gan, Israel
基金
以色列科学基金会;
关键词
temporal power redistribution; side channel analysis; power analysis attacks; hardware security; RESISTANT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Side channel analysis attacks are considered an extreme hardware security hazard for cryptographic devices. There are numerous approaches to prevent attackers from extracting useful information from secured devices. Nonetheless the cost of implementing an effective countermeasure is usually very high in terms of area/performance. In this paper we propose a novel approach to the temporal redistribution of the power information. Specifically, we present a circuit level methodology that makes it possible to manipulate the three main parameters of the current profile during the clock period: the start time of the computation, the duration and the amplitude. The effectiveness of the proposed countermeasure was evaluated on a 4-bit cryptographic function in a 65nm TSMC process. The simulation results indicate that the number of secret bits that leaked from the protected design (i.e., the mutual information) was reduced dramatically from 4 bits to 0.85 bits. In addition, at least 1500 ideal noise-free power traces were required to extract these bits, whereas less than 150 traces were required to extract the whole 4 bits from the unprotected design. The sensitivity of the protected circuit to process and environmental variations are minimal, with measured standard deviation of 0.1bit. The area overhead is up to 32%.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A new countermeasure against side-channel attacks based on hardware-software co-design
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    MICROPROCESSORS AND MICROSYSTEMS, 2016, 45 : 324 - 338
  • [22] Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 465 - 469
  • [23] SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?
    Neskovic, Andrija
    Mulhem, Saleh
    Treff, Alexander
    Buchty, Rainer
    Eisenbarth, Thomas
    Berekovic, Mladen
    2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2023,
  • [24] Side-channel Attack Countermeasure Based on Power Supply Modulation
    Jevtic, Ruzica
    Perez-Tirador, Pablo
    Cabezaolias, Carmen
    Carnero, Pablo
    Caffarena, Gabriel
    2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 618 - 622
  • [25] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773
  • [26] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [27] A Memory Hierarchy Protected against Side-Channel Attacks
    Talaki, Ezinam Bertrand
    Savry, Olivier
    Bouvier Des Noes, Mathieu
    Hely, David
    CRYPTOGRAPHY, 2022, 6 (02)
  • [28] Extractors against side-channel attacks: weak or strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (03) : 231 - 241
  • [29] Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks
    Maghrebi, Houssem
    Danger, Jean-Luc
    Flament, Florent
    Guilley, Sylvain
    Sauvage, Laurent
    2009 3RD INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS (SCS 2009), 2009, : 324 - 329
  • [30] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +