RFTC: Runtime Frequency Tuning Countermeasure Using FPGA Dynamic Reconfiguration to Mitigate Power Analysis Attacks

被引:7
作者
Jayasinghe, Darshana [1 ]
Ignjatovic, Aleksandar [1 ]
Parameswaran, Sri [1 ]
机构
[1] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW, Australia
来源
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) | 2019年
关键词
D O I
10.1145/3316781.3317899
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Random execution time-based countermeasures against power analysis attacks have reduced resource overheads when compared to balancing power dissipation and masking countermeasures. The previous countermeasures on randomization use either a small number of clock frequencies or delays to randomize the execution. This paper presents a novel random frequency countermeasure (referred to as RFTC) using the dynamic reconfiguration ability of clock managers of Field-Programmable Gate Arrays - FPGAs (such as Xilinx Mixed-Mode Clock Manager - MMCM) which can change the frequency of operation at runtime. We show for the first time how Advanced Encryption Standard (AES) block cipher algorithm can be executed using randomly selected clock frequencies (amongst thousands of frequencies carefully chosen) generated within the FPGA to mitigate power analysis attack vulnerabilities. To test the effectiveness of the proposed clock randomization, Correlation Power analysis (CPA) attacks are performed on the collected power traces. Preprocessing methods, such as Dynamic Time Warping (DTW), Principal Component Analysis (PCA) and Fast Fourier Transform (FFT), based power analysis attacks are performed on the collected traces to test the effective removal of random execution. Compared to the state of the art, where there were 83 distinct finishing times for each encryption, the method described in this paper can have more than 60,000 distinct finishing times for each encryption, making it resistant against power analysis attacks when preprocessed and demonstrated to be secure up to four million traces.
引用
收藏
页数:6
相关论文
共 23 条
[1]  
Altera, 2015, ALT I O PHAS LOCK LO
[2]  
[Anonymous], 2013, SMART CARD RES ADV A
[3]  
[Anonymous], 2001, FEDERAL INFORM PROCE, V197
[4]  
Boey KH, 2010, PROCEEDINGS OF THE 2010 IEEE ASIA PACIFIC CONFERENCE ON CIRCUIT AND SYSTEM (APCCAS), P756, DOI 10.1109/APCCAS.2010.5774887
[5]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[6]   A countermeasure against differential power analysis based on random delay insertion [J].
Bucci, M ;
Luzzi, R ;
Guglielmo, M ;
Trifiletti, A .
2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, :3547-3550
[7]  
Cooper J., 2013, ICMC 2013
[8]  
Coron Jean-Sebastien., 2010, Analysis and Improvement of the Random Delay Countermeasure of CHES 2009, P95
[9]  
Fledel D., 2018, IACR, P317
[10]  
Fritzke A. W., 2012, THESIS