Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES

被引:2
|
作者
Brisfors, Martin [1 ]
Moraitis, Michail [1 ]
Dubrova, Elena [1 ]
机构
[1] Royal Inst Technol KTH, Electrum 229, S-19640 Stockholm, Sweden
关键词
Side-channel attack; Random Execution Time; Randomized Clock; Countermeasure; Oversampling; Deep Learning; FPGA; AES; Correlation Power Analysis; POWER ANALYSIS; COUNTERMEASURE;
D O I
10.1007/978-3-031-30122-3_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Clock randomization is one of the oldest countermeasures against side-channel attacks. Various implementations have been presented in the past, along with positive security evaluations. However, in this paper we show that it is possible to break countermeasures based on a randomized clock by sampling side-channel measurements at a frequency much higher than the encryption clock, synchronizing the traces with pre-processing, and targeting the beginning of the encryption. We demonstrate a deep learning-based side-channel attack on a protected FPGA implementation of AES which can recover a subkey from less than 500 power traces. In contrast to previous attacks on FPGA implementations of AES which targeted the last round, the presented attack uses the first round as the attack point. Any randomized clock countermeasure is significantly weakened by an attack on the first round because the effect of randomness accumulated over multiple encryption rounds is lost.
引用
收藏
页码:38 / 53
页数:16
相关论文
共 50 条
  • [1] A side-channel resistant implementation of AES combining clock randomization with duplication
    Moraitis, Michail
    Brisfors, Martin
    Dubrova, Elena
    Lindskog, Niklas
    Englund, Hakan
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [2] Side-Channel Protected PIPO Implementation in Hardware
    Han, Jaeseung
    Kim, Yeon-Jae
    Han, Dong-Guk
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [3] Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
    Brisfors, Martin
    Moraitis, Michail
    Landin, Gabriel Klasson
    Jilborg, Truls
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 372 - 387
  • [4] Deep learning side-channel attack against hardware implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 87
  • [5] Deep Learning Side-Channel Attack against Hardware Implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 261 - 268
  • [6] A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber
    Ji, Yanning
    Wang, Ruize
    Ngo, Kalle
    Dubrova, Elena
    Backlund, Linus
    2023 IEEE EUROPEAN TEST SYMPOSIUM, ETS, 2023,
  • [7] An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
    Gross, Hannes
    Mangard, Stefan
    Korak, Thomas
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 95 - 112
  • [8] Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES
    Wang H.
    Dubrova E.
    SN Computer Science, 2021, 2 (5)
  • [9] Improved algebraic side-channel attack on AES
    Mohamed, Mohamed Saied Emam
    Bulygin, Stanislav
    Zohner, Michael
    Heuser, Annelie
    Walter, Michael
    Buchmann, Johannes
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 139 - 156
  • [10] A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber
    Ji, Yanning
    Dubrova, Elena
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 27 - 37