Side-Channel Attacks on Triple Modular Redundancy Schemes

被引:0
作者
Almeida, Felipe [1 ]
Aksoy, Levent [1 ]
Raik, Jaan [1 ]
Pagliarini, Samuel [1 ]
机构
[1] Tallinn Univ Technol, Dept Comp Syst, Tallinn, Estonia
来源
2021 IEEE 30TH ASIAN TEST SYMPOSIUM (ATS 2021) | 2021年
关键词
triple modular redundancy; side-channel attacks; advanced encryption standard;
D O I
10.1109/ATS52891.2021.00026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Triple Modular Redundancy (TMR) is a well-known fault tolerance technique for avoiding errors in the Integrated Circuits (ICs) and it has been used in a wide range of applications. The TMR technique employs three instances of circuits realizing concurrently the same functionality whose outputs are compared through a majority voter. On the other hand, SideChannel Attacks (SCAs) are powerful techniques to extract secret information from ICs based on the data collected from security critical operations. Over the years, the interplay between security and reliability is poorly studied. In this paper, we explore the performance of SCAs on the well-known Advanced Encryption Standard (AES) and its different realizations using the TMR technique. In this work, three implementations of the AES design under the TMR scheme are used and an SCA, which can collect power dissipation data from the physical netlist through simulations, is developed. The experimental results show that the TMR technique can increase the computation time of SCAs and more importantly, the use of functionally equivalent, but physically and structurally different instances in the TMR scheme can make it impossible for SCAs to discover the secret key.
引用
收藏
页码:79 / 84
页数:6
相关论文
共 50 条
  • [31] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1573 - 1576
  • [32] Unified point addition formulae and side-channel attacks
    Stebila, Douglas
    Theriault, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 354 - 368
  • [33] The investigation of neural networks performance in side-channel attacks
    Kong, Yinan
    Saeedi, Ehsan
    ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (01) : 607 - 623
  • [34] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [35] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518
  • [36] Multiple-differential side-channel collision attacks on AES
    Bogdanov, Andrey
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 30 - 44
  • [37] Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction
    Alqurashi, Fahad
    AL-Hashimi, Mohammed
    Saleh, Mostafa
    Abulnaja, Osama
    COMPUTERS, 2025, 14 (02)
  • [38] Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs
    Moini, Shayan
    Tian, Shanquan
    Holcomb, Daniel
    Szefer, Jakub
    Tessier, Russell
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 357 - 370
  • [39] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [40] Profiling side-channel attacks based on CNN model fusion
    Ni, Lei
    Wang, Pengjun
    Zhang, Yuejun
    Zhang, Huihong
    Li, Xiangyu
    Ni, Li
    Lv, Jie
    Zheng, Weifang
    MICROELECTRONICS JOURNAL, 2023, 139