Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations

被引:0
作者
He, Jiaji [1 ]
Ma, Haocheng [2 ]
Guo, Xialong [3 ]
Zhao, Yiqiang [2 ]
Jin, Yier [4 ]
机构
[1] Tsinghua Univ, Inst Microelect, Beijing, Peoples R China
[2] Tianjin Univ, Sch Microelect, Tianjin, Peoples R China
[3] Kansas State Univ, Dept Elect & Comp Engn, Manhattan, KS 66506 USA
[4] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
来源
2020 25TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2020 | 2020年
基金
中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electromagnetic (EM) side-channel attacks aim at extracting secret information from cryptographic hardware implementations. Countermeasures have been proposed at device level, register-transfer level (RTL) and layout level, though efficient, there are still requirements for quantitative assessment of the hardware implementations' resistance against EM side-channel attacks. In this paper, we propose a design for EM side-channel security evaluation and optimization framework based on the t-test evaluation results derived from RTL hardware implementations. Different implementations of the same cryptographic algorithm are evaluated under different hypothesis leakage models considering the driven capabilities of logic components, and the evaluation results are validated with side-channel attacks on FPGA platform. Experimental results prove the feasibility of the proposed side-channel leakage evaluation method at pre-silicon stage. The remedies and suggested security design rules are also discussed.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
[41]   A Survey of Side-Channel Leakage Assessment [J].
Wang, Yaru ;
Tang, Ming .
ELECTRONICS, 2023, 12 (16)
[42]   Improving IIoT security: Unveiling threats through advanced side-channel analysis [J].
He, Dalin ;
Wang, Huanyu ;
Deng, Tuo ;
Liu, Jishi ;
Wang, Junnian .
COMPUTERS & SECURITY, 2025, 148
[43]   DESIGN OF EFFICIENT SIDE-CHANNEL SPILLWAY [J].
KNIGHT, ACE .
JOURNAL OF HYDRAULIC ENGINEERING-ASCE, 1989, 115 (09) :1275-1289
[44]   High-level synthesis design flow for power side-channel security [J].
Zhang L. ;
Mu D. ;
Hu W. ;
Tai Y. .
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2020, 47 (04) :64-69
[45]   HYDRAULIC DESIGN OF SIDE-CHANNEL SPILLWAYS [J].
MOSS, WD .
WATER AND WATER ENGINEERING, 1971, 75 (906) :302-&
[46]   Side-Channel Information Leakage of Code-Based Masked Implementations [J].
Cheng, Wei ;
Rioul, Olivier ;
Liu, Yi ;
Beguinot, Julien ;
Guilley, Sylvain .
2022 17TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2022, :51-56
[47]   Deep learning side-channel attack against hardware implementations of AES [J].
Kubota, Takaya ;
Yoshida, Kota ;
Shiozaki, Mitsuru ;
Fujino, Takeshi .
MICROPROCESSORS AND MICROSYSTEMS, 2021, 87
[48]   A Key-Recovery Side-Channel Attack on Classic McEliece Implementations [J].
Guo Q. ;
Johansson A. ;
Johansson T. .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04) :800-827
[49]   Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations [J].
Nascimento, Erick ;
Chmielewski, Lukasz .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 :213-231
[50]   CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations [J].
Deng, Sen ;
Li, Mengyuan ;
Tang, Yining ;
Wang, Shuai ;
Yan, Shoumeng ;
Zhang, Yinqian .
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, :6843-6860