Side-Channel Attacks on Triple Modular Redundancy Schemes

被引:0
|
作者
Almeida, Felipe [1 ]
Aksoy, Levent [1 ]
Raik, Jaan [1 ]
Pagliarini, Samuel [1 ]
机构
[1] Tallinn Univ Technol, Dept Comp Syst, Tallinn, Estonia
来源
2021 IEEE 30TH ASIAN TEST SYMPOSIUM (ATS 2021) | 2021年
关键词
triple modular redundancy; side-channel attacks; advanced encryption standard;
D O I
10.1109/ATS52891.2021.00026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Triple Modular Redundancy (TMR) is a well-known fault tolerance technique for avoiding errors in the Integrated Circuits (ICs) and it has been used in a wide range of applications. The TMR technique employs three instances of circuits realizing concurrently the same functionality whose outputs are compared through a majority voter. On the other hand, SideChannel Attacks (SCAs) are powerful techniques to extract secret information from ICs based on the data collected from security critical operations. Over the years, the interplay between security and reliability is poorly studied. In this paper, we explore the performance of SCAs on the well-known Advanced Encryption Standard (AES) and its different realizations using the TMR technique. In this work, three implementations of the AES design under the TMR scheme are used and an SCA, which can collect power dissipation data from the physical netlist through simulations, is developed. The experimental results show that the TMR technique can increase the computation time of SCAs and more importantly, the use of functionally equivalent, but physically and structurally different instances in the TMR scheme can make it impossible for SCAs to discover the secret key.
引用
收藏
页码:79 / 84
页数:6
相关论文
共 50 条
  • [21] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773
  • [22] Applying Thermal Side-Channel Attacks on Asymmetric Cryptography
    Aljuffri, Abdullah
    Zwalua, Marc
    Reinbrecht, Cezar Rodolfo Wedig
    Hamdioui, Said
    Taouil, Mottaqiallah
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (11) : 1930 - 1942
  • [23] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (04) : 511 - 518
  • [24] A Memory Hierarchy Protected against Side-Channel Attacks
    Talaki, Ezinam Bertrand
    Savry, Olivier
    Bouvier Des Noes, Mathieu
    Hely, David
    CRYPTOGRAPHY, 2022, 6 (02)
  • [25] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [26] Moving Target Defense Mechanism for Side-Channel Attacks
    Vuppala, Satyanarayana
    Mady, Alie El-Din
    Kuenzi, Adam
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1810 - 1819
  • [27] Amplifying side-channel attacks with techniques from block cipher cryptanalysis
    Phan, Raphael C. -W.
    Yen, Sung-Ming
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 135 - 150
  • [28] The investigation of neural networks performance in side-channel attacks
    Kong, Yinan
    Saeedi, Ehsan
    ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (01) : 607 - 623
  • [29] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [30] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518