Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations

被引:0
作者
He, Jiaji [1 ]
Ma, Haocheng [2 ]
Guo, Xialong [3 ]
Zhao, Yiqiang [2 ]
Jin, Yier [4 ]
机构
[1] Tsinghua Univ, Inst Microelect, Beijing, Peoples R China
[2] Tianjin Univ, Sch Microelect, Tianjin, Peoples R China
[3] Kansas State Univ, Dept Elect & Comp Engn, Manhattan, KS 66506 USA
[4] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
来源
2020 25TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2020 | 2020年
基金
中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electromagnetic (EM) side-channel attacks aim at extracting secret information from cryptographic hardware implementations. Countermeasures have been proposed at device level, register-transfer level (RTL) and layout level, though efficient, there are still requirements for quantitative assessment of the hardware implementations' resistance against EM side-channel attacks. In this paper, we propose a design for EM side-channel security evaluation and optimization framework based on the t-test evaluation results derived from RTL hardware implementations. Different implementations of the same cryptographic algorithm are evaluated under different hypothesis leakage models considering the driven capabilities of logic components, and the evaluation results are validated with side-channel attacks on FPGA platform. Experimental results prove the feasibility of the proposed side-channel leakage evaluation method at pre-silicon stage. The remedies and suggested security design rules are also discussed.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
[31]   Higher-Order Side-Channel Protected Implementations of KECCAK [J].
Gross, Hannes ;
Schaffenrath, David ;
Mangard, Stefan .
2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, :205-212
[32]   Randomized Switching SAR (RS-SAR) ADC for Power and EM Side-Channel Security [J].
Ashok, Maitreyi ;
Levine, Edlyn, V ;
Chandrakasan, Anantha P. .
IEEE SOLID-STATE CIRCUITS LETTERS, 2022, 5 :247-250
[33]   Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions [J].
Padilla, Jonathan Martinez ;
Meyer-Baese, Uwe ;
Foo, Simon .
EURASIP JOURNAL ON INFORMATION SECURITY, 2018, 2018 (01)
[34]   Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra [J].
Vaudenay, Serge .
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 :55-70
[35]   RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level [J].
He, Miao ;
Park, Jungmin ;
Nahiyan, Adib ;
Vassilev, Apostol ;
Jin, Yier ;
Tehranipoor, Mark .
2019 IEEE 37TH VLSI TEST SYMPOSIUM (VTS), 2019,
[36]   Practical side-channel attack on a security device [J].
San Pedro, Manuel ;
Servant, Victor ;
Guillemet, Charles .
31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, :130-133
[37]   Leveraging Side-Channel Information for Disassembly and Security [J].
Park, Jungmin ;
Rahman, Fahim ;
Vassilev, Apostol T. ;
Forte, Domenic ;
Tehranipoor, Mark .
ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2020, 16 (01)
[38]   A tutorial on physical security and side-channel attacks [J].
Koeune, F ;
Standaert, FX .
FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 :78-108
[39]   Reducing risks through simplicity: high side-channel security for lazy engineers [J].
Bronchain, Olivier ;
Schneider, Tobias ;
Standaert, Francois-Xavier .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (01) :39-55
[40]   Reducing risks through simplicity: high side-channel security for lazy engineers [J].
Olivier Bronchain ;
Tobias Schneider ;
François-Xavier Standaert .
Journal of Cryptographic Engineering, 2021, 11 :39-55