首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >Static power side-channel analysis of a threshold implementation prototype chip
【24h】

Static power side-channel analysis of a threshold implementation prototype chip

机译:阈值实现原型芯片的静态功率侧信道分析

获取原文

摘要

The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. The continuous growth of the leakage power dissipation in nanometer-scaled CMOS technologies is not only inconvenient for effective low power designs, but does also create a new target for power analysis adversaries. In this paper, we present the first experimental results of a static power side-channel analysis targeting an ASIC implementation of a provably first-order secure hardware masking scheme. The investigated 150 nm CMOS prototype chip realizes the PRESENT-80 lightweight block cipher as a threshold implementation and allows us to draw a comparison between the information leakage through its dynamic and static power consumption. By employing a sophisticated measurement setup dedicated to static power analysis, including a very low-noise DC amplifier as well as a climate chamber, we are able to recover the key of our target implementation with significantly less traces compared to the corresponding dynamic power analysis attack. In particular, for a successful third-order attack exploiting the static currents, less than 200 thousand traces are needed. Whereas for the same attack in the dynamic power domain around 5 million measurements are required. Furthermore, we are able to show that only-first-order resistant approaches like the investigated threshold implementation do not significantly increase the complexity of a static power analysis. Therefore, we firmly believe that this side channel can actually become the target of choice for real-world adversaries against masking countermeasures implemented in advanced CMOS technologies.
机译:在加密硬件的侧通道安全性的背景下,现代CMOS器件的静态功耗已成为一个重大问题。纳米级CMOS技术中泄漏功率耗散的不断增长,不仅对有效的低功耗设计带来不便,而且还为功耗分析的对手提出了新的目标。在本文中,我们介绍了针对可证明的一阶安全硬件屏蔽方案的ASIC实现的静态功率侧信道分析的第一个实验结果。被研究的150 nm CMOS原型芯片将PRESENT-80轻量级分组密码实现为阈值实现,并允许我们通过动态功耗和静态功耗对信息泄漏进行比较。通过采用专门用于静态功率分析的精密测量设置,包括一个非常低噪声的DC放大器以及一个气候箱,与相应的动态功率分析攻击相比,我们能够以更少的痕迹恢复目标实施的关键。尤其是,要成功利用静态电流进行三阶攻击,需要的痕迹少于20万条。对于动态功率域中的相同攻击,大约需要进行500万次测量。此外,我们能够证明,仅一阶抗性方法(如研究的阈值实现)不会显着增加静态功率分析的复杂性。因此,我们坚信,对于在先进CMOS技术中实施的掩蔽对策,实际攻击者可以选择使用此辅助通道。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号