Static Power Consumption as a New Side-Channel Analysis Threat to Elliptic Curve Cryptography Implementations

被引:2
作者
Kabin, Ievgen [1 ]
Dyka, Zoya [1 ,2 ]
Sigourou, Alkistis-Aikaterini [1 ]
Langendoerfer, Peter [1 ,2 ]
机构
[1] IHP GmbH, Leibniz Inst High Performance Microelect, D-15236 Frankfurt, Germany
[2] Brandenburg Univ Technol Cottbus Senftenberg, D-03046 Cottbus, Germany
来源
2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR | 2024年
关键词
Side-Channel Analysis (SCA); Attack Exploiting Static Power (AESP); leakage current; horizontal attack; single-trace attack; power trace; Elliptic Curve Cryptosystem (ECC); COUNTERMEASURE;
D O I
10.1109/CSR61664.2024.10679507
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-Channel Analysis is a category of security attacks that targets cryptographic devices or systems exploiting unintended information leakage through observable physical side-channels, e.g. power consumption. Side-Channel Analysis primarily aims at the dynamic power consumption of a target device or system during its operation, particularly when cryptographic operations or sensitive computations are being performed. As semiconductor technology nodes shrink, enabling increased transistor density and improved performance, the static current, also known as leakage current tends to increase. This increase in static power consumption can have critical implications for the security of digital systems, particularly in the context of side-channel attacks. In this paper, by examining the static phase within the clock cycle, we demonstrate how a cryptographic key can be extracted from a single power trace measurement. Our research reveals that static currents effectively expose the cryptographic key, a concern that becomes particularly critical in the context of scaled semiconductor technologies.
引用
收藏
页码:884 / 889
页数:6
相关论文
共 30 条
[1]  
[Anonymous], 2017, About us
[2]  
[Anonymous], 2023, NIST Standard
[3]   Countering Power Analysis Attacks Using Reliable and Aggressive Designs [J].
Avirneni, Naga Durga Prasad ;
Somani, Arun K. .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (06) :1408-1420
[4]  
Bellizia D., 2017, 2017 EUR C CIRC THEO, P1, DOI [10.1109/ECCTD.2017.8093333, DOI 10.1109/ECCTD.2017.8093333]
[5]  
Bellizia D, 2016, PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (MIXDES 2016), P211, DOI 10.1109/MIXDES.2016.7529734
[6]  
Butts JA, 2000, INT SYMP MICROARCH, P191, DOI 10.1109/MICRO.2000.898070
[7]  
Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
[8]   When Failure Analysis Meets Side-Channel Attacks [J].
Di-Battista, Jerome ;
Courrege, Jean-Christophe ;
Rouzeyre, Bruno ;
Torres, Lionel ;
Perdu, Philippe .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 :188-+
[9]  
digilent, Digilent Arty S7 board
[10]  
Dworkin Morris J., 2001, Advanced encryption standard (aes), 2001-11-26 00:11:00, DOI 10.6028/NIST.FIPS.197