Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES

被引:2
|
作者
Brisfors, Martin [1 ]
Moraitis, Michail [1 ]
Dubrova, Elena [1 ]
机构
[1] Royal Inst Technol KTH, Electrum 229, S-19640 Stockholm, Sweden
关键词
Side-channel attack; Random Execution Time; Randomized Clock; Countermeasure; Oversampling; Deep Learning; FPGA; AES; Correlation Power Analysis; POWER ANALYSIS; COUNTERMEASURE;
D O I
10.1007/978-3-031-30122-3_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Clock randomization is one of the oldest countermeasures against side-channel attacks. Various implementations have been presented in the past, along with positive security evaluations. However, in this paper we show that it is possible to break countermeasures based on a randomized clock by sampling side-channel measurements at a frequency much higher than the encryption clock, synchronizing the traces with pre-processing, and targeting the beginning of the encryption. We demonstrate a deep learning-based side-channel attack on a protected FPGA implementation of AES which can recover a subkey from less than 500 power traces. In contrast to previous attacks on FPGA implementations of AES which targeted the last round, the presented attack uses the first round as the attack point. Any randomized clock countermeasure is significantly weakened by an attack on the first round because the effect of randomness accumulated over multiple encryption rounds is lost.
引用
收藏
页码:38 / 53
页数:16
相关论文
共 50 条
  • [21] Side-Channel Power Analysis of a GPU AES Implementation
    Luo, Chao
    Fei, Yunsi
    Luo, Pei
    Mukherjee, Saoni
    Kaeli, David
    2015 33RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2015, : 281 - 288
  • [22] A Complete Tolerant Algebraic Side-Channel Attack for AES with CP
    Liu, Fanghui
    Cruz, Waldemar
    Michel, Laurent
    PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING, 2018, 11008 : 259 - 275
  • [23] Minimizing Side-Channel Attack Vulnerability via Schedule Randomization
    Vreman, Nils
    Pates, Richard
    Krueger, Kristin
    Fohler, Gerhard
    Maggio, Martina
    2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 2928 - 2933
  • [24] Deep-Learning Side-Channel Attack Against STM32 Implementation of AES
    Hu, Fanliang
    Wang, Huanyu
    Wang, Junnian
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 844 - 847
  • [25] A Compact AES Hardware Implementation Secure against 1st-Order Side-Channel Attacks
    Zhang, Qian
    Zhou, Yongbin
    Qiu, Shuang
    Cheng, Wei
    Ming, Jingdian
    Zhang, Rui
    2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2018, : 545 - 552
  • [26] Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC
    Ge, Jingquan
    Gao, Neng
    Tu, Chenyang
    Xiang, Ji
    Liu, Zeyi
    Yuan, Jun
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 197 - 217
  • [27] Hiding Side-channel Leakage through Hardware Randomization: a Comprehensive Overview
    Mentens, Nele
    INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION (SAMOS 2017), 2017, : 269 - 272
  • [28] Fault Attack Detection in AES by Monitoring Power Side-Channel Statistics
    Shylendra, Ahish
    Shukla, Priyesh
    Bhuma, Swamp
    Trivedi, Amit Ranjan
    PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 219 - 224
  • [29] Defeating Hardware Prefetchers in Flush plus Reload Side-Channel Attack
    Wang, Zihao
    Peng, Shuanghe
    Jiang, Wenbin
    Guo, Xinyue
    IEEE ACCESS, 2021, 9 : 21251 - 21257
  • [30] Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU
    Karimi, Elmira
    Fei, Yunsi
    Kaeli, David
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 122 - 131