Power Analysis Based Side Channel Attack

نویسندگان

  • Hasindu Gamaarachchi
  • Harsha Ganegoda
چکیده

Side channel attacks break the secret key of a cryptosystem using channels such as sound, heat, time and power consumption which are originally not intended to leak such information. Power analysis is a branch of side channel attacks where power consumption data is used as the side channel to attack the system. First using a device like an oscilloscope power traces are collected when the cryptographic device is doing the cryptographic operation. Then those traces are statistically analysesd using methods such as Correlation Power Analysis (CPA) to derive the secret key of the system. Being possible to break Advanced Encryption Standard (AES) in few minutes, power analysis attacks have become a serious security issue for cryptographic devices such as smart card. As the first phase of our project, we build a testbed for doing research on power analysis attacks. Since power analysis is a practical type of attack in order to do any research, a testbed is the first requirement. Our testbed includes a PIC microcontroller based cryptographic device, power measuring circuits and a digital oscilloscope in the hardware side. In software side it includes algorithms running on the microcontroller, oscilloscope automation scripts and analysis programs. We verify the functionality of the testbed by attacking AES in time less than 10 minutes. Since building a test bed is a complicated process, having a pre-built testbed would save the time of future researchers. The second phase of our project is to attack the latest cryptographic algorithm called Speck which has been released by National Security Agency (NSA) for use in embedded systems. So far, Speck has not been attacked using power analysis. In spite it has lot of differences to AES making impossible to directly use the power analysis approach used for AES, we introduce novel approaches to break Speck in less than an hour. Therefore, We practically show that even though the algorithm is very new still it is vulnerable to power analysis. The third phase of the project is to work on countermeasures. After getting familiar with the current state of art, we select few already introduced countermeasures and practically attack them on our testbed to do a comparative analysis. Meanwhile, we try to form our own countermeasures and to improve existing countermeasures. Under circuit based countermeasures, the existing idea of implementing power line filters is practically implemented and tested. We show that it is not safe enough. We try few of our own circuit based ideas as well, to evaluate how good they are as countermeasures. But unfortunately none of them are good enough. Under software based countermeasures existing methods called random instruction injection and randomly shuffling Sboxes are implemented and tested. We show that those countermeasures are good enough for their simplicity and cost. But we identify the possible threat due to the problem of generating a good seed for the pseudo random algorithm running on the microcontroller. We address this issue by using a hardware based true random generator that amplifies a random electrical signal and samples to generate a proper seed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

Implementation of Power Analysis Attack using SASEBO-W

Side Channel Attacks exploit information that leaks from a cryptographic device. Power Analysis is a kind of side channel attack which reveals the key of cryptographic device by analyzing its power consumption. Power analysis attack causes serious threat to the security of cryptographic devices. Differential Power Analysis Attack is most widely used against embedded devices but suffers from few...

متن کامل

Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems

Elliptic curve cryptosystems have become the most trusted, secure systems in widespread use today. However, the recent advent of utilizing side channel information poses an immediate and powerful threat to systems which are not prepared for this exact type of attack. Side channel analysis (SCA) attacks use some measured quantities outside the scope of the actual cryptographic algorithm, in addi...

متن کامل

Multiprocessor information concealment architecture to prevent power analysis-based side channel attacks

Side channel attackers observe external manifestations of internal computations in an embedded system to predict the encryption key employed. The ability to examine such external manifestations (power dissipation or electromagnetic emissions), is a major threat to secure embedded systems. This paper proposes a secure multiprocessor architecture to prevent side channel attacks, based on a dual-c...

متن کامل

Side-Channel Analysis of Keymill

One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand both simple power analysis (SPA) and differe...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1801.00932  شماره 

صفحات  -

تاریخ انتشار 2018