A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations

被引:5
作者
Iyer, Vishnuvardhan [1 ]
Wang, Meizhi [1 ]
Kulkarni, Jaydeep [1 ]
Yilmaz, Ali E. [1 ]
机构
[1] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
来源
2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI) | 2021年
关键词
Side-channel attacks; electromagnetic measurements; measurement techniques; analysis of variance;
D O I
10.1109/ISI53945.2021.9624778
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The effectiveness of coarse- and fine-grained electromagnetic (EM) side-channel analysis (SCA) attacks, as well as power SCA attacks, are empirically evaluated on implementations of the Advanced Encryption Standard (AES) algorithm. Coarse-grained EM and power SCA attacks use a single sensor configuration to measure the aggregated EM emanation or power consumption for a large set of encryptions, and then analyze this set of signals to recover all encryption key bytes. In contrast, fine-grained EM SCA attacks first perform high-resolution scans with relatively small probes in multiple orientations to localize on-chip information leakage, and then use a specific probe configuration for each key byte to collect and analyze signals. The fine-grained EM SCA attacks are found to be up to >70x more effective than coarse-grained EM and power SCA attacks when extracting the key from 3 implementations of 128-bit AES. They are constrained, however, by the potentially prohibitive cost of the initial search to identify effective probe configurations. Search protocols, categorized according to the threat model, to reduce this one-time acquisition cost are presented and are found to require similar to 8-15x fewer measurements compared to an exhaustive search.
引用
收藏
页码:46 / 51
页数:6
相关论文
共 50 条
[21]   Side-Channel Attacks: A Short Tour [J].
Piessens, Frank ;
van Oorschot, Paul C. ;
Piessens, Frank ;
van Oorshot, Paul C. .
IEEE SECURITY & PRIVACY, 2024, 22 (02) :75-80
[22]   Short Paper: Analysis of Vivado implementation strategies regarding side-channel leakage for FPGA-based AES implementations [J].
Asghar, Ali ;
Becher, Andreas ;
Ziener, Daniel .
PROCEEDINGS OF THE 13TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2024, 2024, :45-49
[23]   Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices [J].
Spreitzer, Raphael ;
Moonsamy, Veelasha ;
Korak, Thomas ;
Mangard, Stefan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :465-488
[24]   Differential side channel analysis attacks on FPGA implementations of ARIA [J].
Kim, ChangKyun ;
Schlaeffer, Martin ;
Moon, SangJae .
ETRI JOURNAL, 2008, 30 (02) :315-325
[25]   Influence of Synthesis Parameters on Vulnerability to Side-Channel Attacks [J].
Balihar, Tomas ;
Novotny, Martin .
2021 10TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO, 2021, :735-740
[26]   Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks [J].
Kwon, Donggeun ;
Hong, Seokhie ;
Kim, Heeseok .
IEEE ACCESS, 2022, 10 :5957-5967
[27]   SNR-Centric Power Trace Extractors for Side-Channel Attacks [J].
Ou, Changhai ;
Lam, Siew-Kei ;
Sun, Degang ;
Zhou, Xinping ;
Qiao, Kexin ;
Wang, Qu .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (04) :620-632
[28]   Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks [J].
Ansari, Nadia Mustaqim ;
Hussain, Rashid ;
Arif, Sheeraz ;
Hussain, Syed Sajjad .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01) :1861-1875
[29]   Temperature Impact on Remote Power Side-Channel Attacks on Shared FPGAs [J].
Glamocanin, Ognjen ;
Bazaz, Hajira ;
Payer, Mathias ;
Stojilovic, Mirjana .
2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
[30]   Analysis and countermeasures to side-channel attacks: a hardware design perspective [J].
Zoni, Davide .
2019 14TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC 2019), 2019, :1-4