Circuits and design techniques for secure ICs resistant to side-channel attacks

被引:0
|
作者
Verbauwhede, I. [1 ,2 ]
Tiri, K. [2 ]
Hwang, D. [2 ]
Schaumont, P. [3 ]
机构
[1] Katholieke Univ Leuven, Louvain, Belgium
[2] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
[3] Virginia Tech, Dept Math, Blacksburg, VA 24061 USA
来源
2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS | 2006年
关键词
security; integrated circuits; side-channel attacks; VLSI design methods;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Integrated circuits used for security applications, such as smart-cards, leak information. The key or other sensitive information, can be guessed by monitoring the execution time, the power variation and/or the electromagnetic radiation of the integrated circuit. This class of so-called side-channel attacks doesn't need expensive equipment or intrusive monitoring to be effective. We have shown that we can obtain the secret key out of a regular standard CMOS implementation of the AES encryption algorithm by monitoring the power consumption of only 2000 encryptions. This is orders of magnitude lower than the mathematical security of 2128 possible encryption keys to break the algorithm. The root cause of this problem is that standard CMOS is power efficient and it will only consume dynamic power when nodes are switching. Mathematical solutions have been proposed that include randomization and masking techniques. Our original approach is that we address the problem at circuit level. Instead of a full custom layout, a few key modifications are incorporated in a regular synchronous CMOS standard cell design flow. We will present the basis for side-channel attack resistance and adjust the library databases and constraint files of the synthesis and place & route procedures. We will show the measurement results on two functionally identical co-processors which were fabricated using a TSMC 6M 0.18 mu m CMOS. We will also discuss issues of side-channel resistance when implementing ICs in future technologies.
引用
收藏
页码:57 / +
页数:2
相关论文
共 50 条
  • [1] SecDir: A Secure Directory to Defeat Directory Side-Channel Attacks
    Yan, Mengjia
    Wen, Jen-Yang
    Fletcher, Christopher W.
    Torrellas, Josep
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 332 - 345
  • [2] Design and Verification of Secure Cache Wrapper against Access-driven Side-Channel Attacks
    Niazmand, Behrad
    Azad, Siavoosh Payandeh
    Jervan, Gert
    Sepulveda, Johanna
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 672 - 676
  • [3] Randomization approaches for Secure SAR ADC design resilient against Power Side-Channel Attacks
    Karanth, Sumanth N.
    Oruganti, Sirish
    Wang, Meizhi
    Kulkarni, Jaydeep P.
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 282 - 292
  • [4] MEAS: memory encryption and authentication secure against side-channel attacks
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 137 - 158
  • [5] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [6] MEAS: memory encryption and authentication secure against side-channel attacks
    Thomas Unterluggauer
    Mario Werner
    Stefan Mangard
    Journal of Cryptographic Engineering, 2019, 9 : 137 - 158
  • [7] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [8] Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications
    Zhang, Yuan
    Mao, Yunlong
    Xu, Minze
    Xu, Fengyuan
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1008 - 1018
  • [9] Design of a Set of Software Tools for Side-Channel Attacks
    Fuentes, A.
    Hernandez, L.
    Martin, A.
    Alarcos, B.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (06) : 1966 - 1978
  • [10] Applications of machine learning techniques in side-channel attacks: a survey
    Benjamin Hettwer
    Stefan Gehrer
    Tim Güneysu
    Journal of Cryptographic Engineering, 2020, 10 : 135 - 162