Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks

被引:0
|
作者
Zooker, David [1 ]
Elkoni, Matan [1 ]
Shalom, Or Ohev [1 ]
Weizman, Yoav [1 ]
Levi, Itamar [1 ]
Keren, Osnat [1 ]
Fish, Alexander [1 ]
机构
[1] Bar Ilan Univ, Fac Engn, Ramat Gan, Israel
基金
以色列科学基金会;
关键词
temporal power redistribution; side channel analysis; power analysis attacks; hardware security; RESISTANT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Side channel analysis attacks are considered an extreme hardware security hazard for cryptographic devices. There are numerous approaches to prevent attackers from extracting useful information from secured devices. Nonetheless the cost of implementing an effective countermeasure is usually very high in terms of area/performance. In this paper we propose a novel approach to the temporal redistribution of the power information. Specifically, we present a circuit level methodology that makes it possible to manipulate the three main parameters of the current profile during the clock period: the start time of the computation, the duration and the amplitude. The effectiveness of the proposed countermeasure was evaluated on a 4-bit cryptographic function in a 65nm TSMC process. The simulation results indicate that the number of secret bits that leaked from the protected design (i.e., the mutual information) was reduced dramatically from 4 bits to 0.85 bits. In addition, at least 1500 ideal noise-free power traces were required to extract these bits, whereas less than 150 traces were required to extract the whole 4 bits from the unprotected design. The sensitivity of the protected circuit to process and environmental variations are minimal, with measured standard deviation of 0.1bit. The area overhead is up to 32%.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Extractors against side-channel attacks: weak or strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (03) : 231 - 241
  • [32] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1573 - 1576
  • [33] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [34] Extractors against Side-Channel Attacks: Weak or Strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 256 - 272
  • [35] Power Side-Channel Attacks in Negative Capacitance Transistor
    Knechtel, Johann
    Patnaik, Satwik
    Nabeel, Mohammed
    Ashraf, Mohammed
    Chauhan, Yogesh S.
    Henkel, Jorg
    Sinanoglu, Ozgur
    Amrouch, Hussam
    IEEE MICRO, 2020, 40 (06) : 74 - 83
  • [36] An efficient countermeasure against side channel attacks for pairing computation
    Shirase, Masaaki
    Takagi, Tsuyoshi
    Okamoto, Eiji
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 290 - +
  • [37] On the exact flexibility of the flexible countermeasure against side channel attacks
    Okeya, K
    Takagi, T
    Vuillaume, C
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 466 - 477
  • [38] Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
    Wang, Chenguang
    Cai, Yici
    Wang, Haoyi
    Zhou, Qiang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [39] FLUSH plus PREFETCH: A countermeasure against access-driven cache-based side-channel attacks
    Mukhtar, M. Asim
    Mushtaq, Maria
    Bhatti, M. Khurram
    Lapotre, Vianney
    Gogniat, Guy
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 104
  • [40] Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
    Luo, Pei
    Fei, Yunsi
    Zhang, Liwei
    Ding, A. Adam
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,