Dual-Hiding Side-Channel-Attack Resistant FPGA-Based Asynchronous-Logic AES: Design, Countermeasures and Evaluation

被引:18
作者
Chong, Kwen-Siong [1 ]
Ng, Jun-Sheng [1 ]
Chen, Juncheng [1 ]
Lwin, Ne Kyaw Zwa [1 ]
Kyaw, Nay Aung [1 ]
Ho, Weng-Geng [1 ]
Chang, Joseph [1 ]
Gwee, Bah-Hwee [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Latches; Field programmable gate arrays; Encryption; Resistance; Hardware; Clocks; Macrocell networks; Advanced encryption standard (AES); asynchronous circuits; cryptography; data security; design methodology; encryption; field-programmable-gate-array (FPGA); side-channel-attack (SCA); POWER ANALYSIS ATTACKS; SYNCHRONOUS-LOGIC; DPA; IMPLEMENTATION; PERFORMANCE; CMOS;
D O I
10.1109/JETCAS.2021.3077887
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present a side-channel-attack (SCA) resistant asynchronous-logic (async-logic) Advanced Encryption Standard (AES) accelerator with dual-hiding SCA countermeasures, i.e. the amplitude moderation (vertical dimension) and the time moderation (horizontal dimension). There are five contributions in this paper. First, we propose an async-logic design flow with relative timing to simplify the AES realization in Field-Programmable-Gate-Array (FPGA). Second, we optimize completion detection circuits therein to achieve a low power/overhead solution. Third, we propose a randomized delay-line control and a data-propagation control to amplify the dual-hiding SCA countermeasures for our async-logic AES accelerator. Fourth, we validate the async-logic design flow based on two commercially-available Sakura-X and Arty-A7 FPGA boards. Fifth, we comprehensively evaluate 74 SCA attacking models for our async-logic AES accelerator on these two boards, and compare the results against a benchmarking AES based on synchronous-logic (sync-logic). We show that our async-logic AES accelerator is unbreakable within 1 million electromagnetic (EM) traces where the sync-logic counterpart is breakable within < 30K EM traces. To our best knowledge, our async-logic AES accelerator is the first async-logic AES design evaluated comprehensively at the first/last round, at various attacking locations (i.e. before/after Substitute-Box), and with various Hamming weight/distance, bit model, and zero-model of SCAs.
引用
收藏
页码:343 / 356
页数:14
相关论文
共 47 条
[11]   Energy-efficient synchronous-logic and asynchronous-logic FFT/IFFT processors [J].
Chong, Kwen-Siong ;
Gwee, Bah-Hwee ;
Chang, Joseph S. .
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2007, 42 (09) :2034-2045
[12]  
Chong KS, 2019, PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST)
[13]  
Chong KS, 2015, IEEE C ELEC DEVICES, P297, DOI 10.1109/EDSSC.2015.7285109
[14]   EM and Power SCA-Resilient AES-256 Through &gt;350x Current-Domain Signature Attenuation and Local Lower Metal Routing [J].
Das, Debayan ;
Danial, Josef ;
Golder, Anupam ;
Modak, Nirmoy ;
Maity, Shovan ;
Chatterjee, Baibhab ;
Seo, Dong-Hyun ;
Chang, Muya ;
Varna, Avinash L. ;
Krishnamurthy, Harish K. ;
Mathew, Sanu ;
Ghosh, Santosh ;
Raychowdhury, Arijit ;
Sen, Shreyas .
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2021, 56 (01) :136-150
[15]   ASNI: Attenuated Signature Noise Injection for Low-Overhead Power Side-Channel Attack Immunity [J].
Das, Debayan ;
Maity, Shovan ;
Bin Nasir, Saad ;
Ghosh, Santosh ;
Raychowdhury, Arijit ;
Sen, Shreyas .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2018, 65 (10) :3300-3311
[16]   Enabling Microarchitectural Randomization in Serialized AES Implementations to Mitigate Side Channel Susceptibility [J].
Dhanuskodi, Siva Nishok ;
Holcomb, Daniel .
2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, :315-320
[17]   A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation [J].
Gornik, Andreas ;
Moradi, Amir ;
Oehm, Juergen ;
Paar, Christof .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) :1308-1319
[18]   AES-based security coprocessor IC in 0.18-μm CMOS with resistance to differential power analysis side-channel attacks [J].
Hwang, DD ;
Tiri, K ;
Hodjat, A ;
Lai, BC ;
Yang, SL ;
Schallmont, P ;
Verbauwhede, I .
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2006, 41 (04) :781-791
[19]   Reducing Power Side-Channel Information Leakage of AES Engines Using Fully Integrated Inductive Voltage Regulator [J].
Kar, Monodeep ;
Singh, Arvind ;
Mathew, Sanu K. ;
Rajan, Anand ;
De, Vivek ;
Mukhopadhyay, Saibal .
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2018, 53 (08) :2399-2414
[20]   Introduction to differential power analysis [J].
Kocher, Paul ;
Jaffe, Joshua ;
Jun, Benjamin ;
Rohatgi, Pankaj .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (01) :5-27