Circuits and design techniques for secure ICs resistant to side-channel attacks

被引:0
|
作者
Verbauwhede, I. [1 ,2 ]
Tiri, K. [2 ]
Hwang, D. [2 ]
Schaumont, P. [3 ]
机构
[1] Katholieke Univ Leuven, Louvain, Belgium
[2] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
[3] Virginia Tech, Dept Math, Blacksburg, VA 24061 USA
来源
2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS | 2006年
关键词
security; integrated circuits; side-channel attacks; VLSI design methods;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Integrated circuits used for security applications, such as smart-cards, leak information. The key or other sensitive information, can be guessed by monitoring the execution time, the power variation and/or the electromagnetic radiation of the integrated circuit. This class of so-called side-channel attacks doesn't need expensive equipment or intrusive monitoring to be effective. We have shown that we can obtain the secret key out of a regular standard CMOS implementation of the AES encryption algorithm by monitoring the power consumption of only 2000 encryptions. This is orders of magnitude lower than the mathematical security of 2128 possible encryption keys to break the algorithm. The root cause of this problem is that standard CMOS is power efficient and it will only consume dynamic power when nodes are switching. Mathematical solutions have been proposed that include randomization and masking techniques. Our original approach is that we address the problem at circuit level. Instead of a full custom layout, a few key modifications are incorporated in a regular synchronous CMOS standard cell design flow. We will present the basis for side-channel attack resistance and adjust the library databases and constraint files of the synthesis and place & route procedures. We will show the measurement results on two functionally identical co-processors which were fabricated using a TSMC 6M 0.18 mu m CMOS. We will also discuss issues of side-channel resistance when implementing ICs in future technologies.
引用
收藏
页码:57 / +
页数:2
相关论文
共 50 条
  • [31] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [32] Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks
    Bhandari, Jitendra
    Mankali, Likhitha
    Nabeel, Mohammed
    Sinanoglu, Ozgur
    Karri, Ramesh
    Knechtel, Johann
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (12) : 4439 - 4452
  • [33] Wireless Charging Power Side-Channel Attacks
    La Cour, Alexander S.
    Afridi, Khurram K.
    Suh, G. Edward
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665
  • [34] Improved side-channel collision attacks on AES
    Bogdanov, Andrey
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 84 - 95
  • [35] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [36] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21
  • [37] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [38] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [39] Remote Side-Channel Attacks on Heterogeneous SoC
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    Olivier, Francis
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 109 - 125
  • [40] Side-Channel Attacks Detection Methods: A Survey
    Assaeedi, Joanna
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 288 - 296