Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure

被引:0
作者
Brisfors, Martin [1 ]
Moraitis, Michail [1 ]
Landin, Gabriel Klasson [1 ]
Jilborg, Truls [1 ]
机构
[1] Royal Inst Technol KTH, Electrum 229, S-19640 Stockholm, Sweden
来源
FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023 | 2024年 / 14551卷
基金
瑞典研究理事会;
关键词
Side-channel attack; Random Execution Time; Countermeasure; Deep Learning; FPGA;
D O I
10.1007/978-3-031-57537-2_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of deep learning has revolutionized side-channel attacks, making them a serious threat to cryptographic systems. Clock randomization is a well-established mitigation technique against side-channel attacks that, when combined with duplication, has been shown to effectively protect FPGA implementations of block ciphers and post-quantum KEMs. In this paper, we present two deep-learning-based side-channel attacks on an FPGA implementation of AES protected with the clock randomization and duplication countermeasure. The attacks are based on identifying sporadic synchronicity in the execution of the encryption rounds of the two AES cores. We remedy this vulnerability by presenting three modular additions to the original design of the countermeasure that restores its security and increases its robustness.
引用
收藏
页码:372 / 387
页数:16
相关论文
共 28 条
[1]  
[Anonymous], 2018, 7 series fpgas clocking resources
[2]  
Benadjila R., 2018, Cryptology ePrint Archive
[3]  
Boey KH, 2010, PROCEEDINGS OF THE 2010 IEEE ASIA PACIFIC CONFERENCE ON CIRCUIT AND SYSTEM (APCCAS), P756, DOI 10.1109/APCCAS.2010.5774887
[4]   Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES [J].
Brisfors, Martin ;
Moraitis, Michail ;
Dubrova, Elena .
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 :38-53
[5]   A countermeasure against differential power analysis based on random delay insertion [J].
Bucci, M ;
Luzzi, R ;
Guglielmo, M ;
Trifiletti, A .
2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, :3547-3550
[6]  
Fritzke Austin W, 2012, Obfuscating against side-channel power analysis using hiding techniques for AES
[7]  
Goodwill B. J. Gilbert., 2011, NIST NON ATT TEST WO, V7, P115
[8]  
Güneysu T, 2011, LECT NOTES COMPUT SC, V6917, P33, DOI 10.1007/978-3-642-23951-9_3
[9]   Lightweight Side-Channel Protection using Dynamic Clock Randomization [J].
Hettwer, Benjamin ;
Das, Kallyan ;
Leger, Sebastien ;
Gehrer, Stefan ;
Gueneysu, Tim .
2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2020, :200-207
[10]   RFTC: Runtime Frequency Tuning Countermeasure Using FPGA Dynamic Reconfiguration to Mitigate Power Analysis Attacks [J].
Jayasinghe, Darshana ;
Ignjatovic, Aleksandar ;
Parameswaran, Sri .
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,