Side-Channel Power Analysis of a GPU AES Implementation

被引:0
|
作者
Luo, Chao [1 ]
Fei, Yunsi [1 ]
Luo, Pei [1 ]
Mukherjee, Saoni [1 ]
Kaeli, David [1 ]
机构
[1] Northeastern Univ, Dept Elect & Comp Engn, Boston, MA 02115 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graphics Processing Units (GPUs) have been used to run a range of cryptographic algorithms. The main reason to choose a GPU is to accelerate the encryption/decryption speed. Since GPUs are mainly used for graphics rendering, and only recently have they become a fully-programmable parallel computing device, there has been little attention paid to their vulnerability to side-channel attacks. In this paper we present a study of side-channel vulnerability on a state-of-the-art graphics processor. To the best of our knowledge, this is the first work that attempts to extract the secret key of a block cipher implemented to run on a GPU. We present a side-channel power analysis methodology to extract all of the last round key bytes of a CUDA AES (Advanced Encryption Standard) implementation run on an NVIDIA TESLA GPU. We describe how we capture power traces and evaluate the power consumption of a GPU. We then construct an appropriate power model for the GPU. We propose effective methods to sample and process the GPU power traces so that we can recover the secret key of AES. Our results show that parallel computing hardware systems such as a GPU are highly vulnerable targets to power-based side-channel attacks, and need to be hardened against side-channel threats.
引用
收藏
页码:281 / 288
页数:8
相关论文
共 50 条
  • [21] Quadrivariate Improved Blind Side-Channel Analysis on Boolean Masked AES
    Clavier, Christophe
    Reynaud, Leo
    Wurcker, Antoine
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 : 153 - 167
  • [22] Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
    Brisfors, Martin
    Moraitis, Michail
    Dubrova, Elena
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 38 - 53
  • [23] Implementation on MicroBlaze of AES Algorithm to Reveal Fake Keys Against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    2014 IEEE 23RD INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2014, : 1882 - 1887
  • [24] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
    Luo, Pei
    Zhang, Liwei
    Fei, Yunsi
    Ding, A. Adam
    PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
  • [25] Side-Channel Attacks on Masked Bitsliced Implementations of AES
    Radulescu, Anca
    Choudary, Marios O.
    CRYPTOGRAPHY, 2022, 6 (03)
  • [26] Power Side-Channel Analysis for Different Adders on FPGA
    Zhao, Yilin
    Zhang, Qidi
    Nishikawa, Hiroki
    Kong, Xiangbo
    Tomiyama, Hiroyuki
    18TH INTERNATIONAL SOC DESIGN CONFERENCE 2021 (ISOCC 2021), 2021, : 367 - 368
  • [27] SCAUL: Power Side-Channel Analysis With Unsupervised Learning
    Ramezanpour, Keyvan
    Ampadu, Paul
    Diehl, William
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1626 - 1638
  • [28] SCAR: Power Side-Channel Analysis at RTL Level
    Srivastava, Amisha
    Das, Sanjay
    Choudhury, Navnil
    Psiakis, Rafail
    Silva, Pedro Henrique
    Pal, Debjit
    Basu, Kanad
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2024, 32 (06) : 1110 - 1123
  • [29] First-Order Side-Channel Leakage Analysis of Masked but Asynchronous AES
    Bouvet, Antoine
    Guilley, Sylvain
    Vlasak, Lukas
    SECURITY AND PRIVACY, ICSP 2021, 2021, 1497 : 16 - 29
  • [30] Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity
    Bow, Ivan
    Bete, Nahome
    Saqib, Fareena
    Che, Wenjie
    Patel, Chintan
    Robucci, Ryan
    Chan, Calvin
    Plusquellic, Jim
    CRYPTOGRAPHY, 2020, 4 (02) : 1 - 20