Circuits and design techniques for secure ICs resistant to side-channel attacks

被引:0
|
作者
Verbauwhede, I. [1 ,2 ]
Tiri, K. [2 ]
Hwang, D. [2 ]
Schaumont, P. [3 ]
机构
[1] Katholieke Univ Leuven, Louvain, Belgium
[2] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
[3] Virginia Tech, Dept Math, Blacksburg, VA 24061 USA
来源
2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS | 2006年
关键词
security; integrated circuits; side-channel attacks; VLSI design methods;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Integrated circuits used for security applications, such as smart-cards, leak information. The key or other sensitive information, can be guessed by monitoring the execution time, the power variation and/or the electromagnetic radiation of the integrated circuit. This class of so-called side-channel attacks doesn't need expensive equipment or intrusive monitoring to be effective. We have shown that we can obtain the secret key out of a regular standard CMOS implementation of the AES encryption algorithm by monitoring the power consumption of only 2000 encryptions. This is orders of magnitude lower than the mathematical security of 2128 possible encryption keys to break the algorithm. The root cause of this problem is that standard CMOS is power efficient and it will only consume dynamic power when nodes are switching. Mathematical solutions have been proposed that include randomization and masking techniques. Our original approach is that we address the problem at circuit level. Instead of a full custom layout, a few key modifications are incorporated in a regular synchronous CMOS standard cell design flow. We will present the basis for side-channel attack resistance and adjust the library databases and constraint files of the synthesis and place & route procedures. We will show the measurement results on two functionally identical co-processors which were fabricated using a TSMC 6M 0.18 mu m CMOS. We will also discuss issues of side-channel resistance when implementing ICs in future technologies.
引用
收藏
页码:57 / +
页数:2
相关论文
共 50 条
  • [21] Moving Target Defense Mechanism for Side-Channel Attacks
    Vuppala, Satyanarayana
    Mady, Alie El-Din
    Kuenzi, Adam
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1810 - 1819
  • [22] On Side-Channel Resistant Block Cipher Usage
    Guajardo, Jorge
    Mennink, Bart
    INFORMATION SECURITY, 2011, 6531 : 254 - +
  • [23] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
    Luo, Pei
    Zhang, Liwei
    Fei, Yunsi
    Ding, A. Adam
    PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
  • [24] A Hybrid Signcryption Scheme with Leakage-resilience Resistant to Side-channel Attacks
    Tseng, Yuh-Min
    Ho, Ting-Chieh
    Huang, Sen-Shan
    Tsai, Tung-Tso
    2024 8TH INTERNATIONAL CONFERENCE ON IMAGING, SIGNAL PROCESSING AND COMMUNICATIONS, ICISPC 2024, 2024, : 148 - 155
  • [25] On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography
    Jedlicka, Petr
    Malina, Lukas
    Socha, Petr
    Gerlich, Tomas
    Martinasek, Zdenek
    Hajny, Jan
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [26] Side-Channel Leakage in SFQ Circuits and Related Attacks on Qubit Control and Readout Systems
    Mustafa, Yerzhan
    Kose, Selcuk
    IEEE TRANSACTIONS ON APPLIED SUPERCONDUCTIVITY, 2023, 33 (06)
  • [27] Hardware Security: Physical Design versus Side-channel and Fault Attacks
    Verbauwhede, Ingrid
    ISPD'22: PROCEEDINGS OF THE 2022 INTERNATIONAL SYMPOSIUM ON PHYSICAL DESIGN, 2022, : 219 - 219
  • [28] Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks
    Chen, Zhimin
    Sinha, Ambuj
    Schaumont, Patrick
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) : 124 - 136
  • [29] Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks
    Bongiovanni, Simone
    Centurelli, Francesco
    Scotti, Giuseppe
    Trifiletti, Alessandro
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (04) : 269 - 288
  • [30] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98