Circuits and design techniques for secure ICs resistant to side-channel attacks

被引:0
|
作者
Verbauwhede, I. [1 ,2 ]
Tiri, K. [2 ]
Hwang, D. [2 ]
Schaumont, P. [3 ]
机构
[1] Katholieke Univ Leuven, Louvain, Belgium
[2] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
[3] Virginia Tech, Dept Math, Blacksburg, VA 24061 USA
关键词
security; integrated circuits; side-channel attacks; VLSI design methods;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Integrated circuits used for security applications, such as smart-cards, leak information. The key or other sensitive information, can be guessed by monitoring the execution time, the power variation and/or the electromagnetic radiation of the integrated circuit. This class of so-called side-channel attacks doesn't need expensive equipment or intrusive monitoring to be effective. We have shown that we can obtain the secret key out of a regular standard CMOS implementation of the AES encryption algorithm by monitoring the power consumption of only 2000 encryptions. This is orders of magnitude lower than the mathematical security of 2128 possible encryption keys to break the algorithm. The root cause of this problem is that standard CMOS is power efficient and it will only consume dynamic power when nodes are switching. Mathematical solutions have been proposed that include randomization and masking techniques. Our original approach is that we address the problem at circuit level. Instead of a full custom layout, a few key modifications are incorporated in a regular synchronous CMOS standard cell design flow. We will present the basis for side-channel attack resistance and adjust the library databases and constraint files of the synthesis and place & route procedures. We will show the measurement results on two functionally identical co-processors which were fabricated using a TSMC 6M 0.18 mu m CMOS. We will also discuss issues of side-channel resistance when implementing ICs in future technologies.
引用
收藏
页码:57 / +
页数:2
相关论文
共 50 条
  • [1] A VLSI design flow for secure side-channel attack resistant ICs
    Tiri, K
    Verbauwhede, I
    DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2005, : 58 - 63
  • [2] Automated design of cryptographic devices resistant to multiple side-channel attacks
    Kulikowski, Konrad
    Smirnov, Alexander
    Taubin, Alexander
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 399 - 413
  • [3] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
  • [4] How to secure scan design against scan-based side-channel attacks?
    Zhou, Wei
    Cui, Aijiao
    Li, Huawei
    Qu, Gang
    2017 IEEE 26TH ASIAN TEST SYMPOSIUM (ATS), 2017, : 116 - 121
  • [5] SecDir: A Secure Directory to Defeat Directory Side-Channel Attacks
    Yan, Mengjia
    Wen, Jen-Yang
    Fletcher, Christopher W.
    Torrellas, Josep
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 332 - 345
  • [6] How secure is your cache against side-channel attacks?
    He, Zecheng
    Lee, Ruby B.
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 341 - 353
  • [7] Side-channel Attacks on Memristive Circuits Under External Disturbances
    Chen, Li-Wei
    Zhao, Xianyue
    Chen, Ziang
    Du, Nan
    Polian, Ilia
    2023 IEEE 32ND ASIAN TEST SYMPOSIUM, ATS, 2023, : 171 - 176
  • [8] Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (08) : 1550 - 1554
  • [9] Protecting Secure ICs Against Side-Channel Attacks by Identifying and Quantifying Potential EM and Leakage Hotspots at Simulation Stage
    Poggi, Davide
    Maurine, Philippe
    Ordas, Thomas
    Sarafianos, Alexandre
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 129 - 147
  • [10] Design and Verification of Secure Cache Wrapper against Access-driven Side-Channel Attacks
    Niazmand, Behrad
    Azad, Siavoosh Payandeh
    Jervan, Gert
    Sepulveda, Johanna
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 672 - 676