Physical Time-Varying Transfer Function as Generic Low-Overhead Power-SCA Countermeasure
نویسندگان
چکیده
Mathematically secure cryptographic algorithms leak significant side-channel information through their power supplies when implemented on a physical platform. These leakages can be exploited by an attacker to extract the secret key of embedded device. The existing state-of-the-art countermeasures mainly focus balancing, gate-level masking, or signal-to-noise (SNR) reduction using noise injection and signature attenuation, all which suffer either from limitations high power/area overheads, throughput degradation are not synthesizable. In this article, we propose generic low-overhead digital-friendly SCA countermeasure utilizing Time-Varying Transfer Function (TVTF) randomly shuffling distributed switched capacitors significantly obfuscate traces in time domain. We evaluate our proposed technique Matlab-based system-level simulation. Finally, implement 65nm CMOS prototype IC against attacks (SCA). System-level simulation results TVTF-AES show ~5000× minimum disclosure (MTD) improvement over unprotected implementation with ~1.25× ~1.2× area without any performance degradation. evaluation shows 3.4M MTD is 500× greater than solution.
منابع مشابه
Low Overhead DPA Countermeasure using ExCCel (Exploration of Complementary Cells)
—Differential Power Analysis (DPA) side-channel attacks pose serious threats for embedded system security. WDDL was proposed as a countermeasure that can be incorporated into a conventional ASIC design flow using standard cells. However, our spice simulations show that DPA attacks on WDDL still leak secret keys to adversaries despite the doubled area and energy overheads due to the use of compl...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملLow-Overhead Time-Triggered Group Membership
A group membership protocol is presented and proven correct for a synchronous time-triggered model of computation with processors in a ring that broadcast in turn. The protocol, derived from one used for critical control functions in automobiles, accepts a very restrictive fault model to achieve low overhead and requires only one bit of membership information piggybacked on regular broadcasts. ...
متن کاملRandomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
Power Analysis attacks on elliptic curve cryptosystems and various countermeasures against them, have been first discussed by Coron ([6]). All proposed countermeasures are based on the randomization or blinding of the inputparameters of the binary algorithm. We propose a countermeasure that randomizes the binary algorithm itself. Our algorithm needs approximately 9% more additions than the ordi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE open journal of circuits and systems
سال: 2023
ISSN: ['2644-1225']
DOI: https://doi.org/10.1109/ojcas.2023.3302254