{"title":"屏蔽s盒电路的模板攻击:静态和动态功率分析的比较","authors":"Jiming Xu, H. Heys","doi":"10.1109/NEWCAS.2018.8585541","DOIUrl":null,"url":null,"abstract":"Static-power-based side-channel attacks have developed rapidly in the past few years. Many classical side channel attack algorithms have been adapted to exploit static power consumption. There have been successful applications of side-channel attacks based on static power dissipation of cryptographic circuits designed in different technology sizes. In this paper we perform template attacks on a masked s-box circuit designed and simulated using 45-nm CMOS standard cell library. We are the first to compare template attacks using static power and dynamic power in the context of masked sbox implementations. We are able to achieve successful results using both types of power leakage. However, we observe that, in the 45-nm environment, dynamic power analysis requires a high sampling rate for the oscilloscopes used to collect data, while the results of static power analysis are more sensitive to additive noise.","PeriodicalId":112526,"journal":{"name":"2018 16th IEEE International New Circuits and Systems Conference (NEWCAS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Template Attacks of a Masked S-Box Circuit: A Comparison Between Static and Dynamic Power Analyses\",\"authors\":\"Jiming Xu, H. Heys\",\"doi\":\"10.1109/NEWCAS.2018.8585541\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Static-power-based side-channel attacks have developed rapidly in the past few years. Many classical side channel attack algorithms have been adapted to exploit static power consumption. There have been successful applications of side-channel attacks based on static power dissipation of cryptographic circuits designed in different technology sizes. In this paper we perform template attacks on a masked s-box circuit designed and simulated using 45-nm CMOS standard cell library. We are the first to compare template attacks using static power and dynamic power in the context of masked sbox implementations. We are able to achieve successful results using both types of power leakage. However, we observe that, in the 45-nm environment, dynamic power analysis requires a high sampling rate for the oscilloscopes used to collect data, while the results of static power analysis are more sensitive to additive noise.\",\"PeriodicalId\":112526,\"journal\":{\"name\":\"2018 16th IEEE International New Circuits and Systems Conference (NEWCAS)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 16th IEEE International New Circuits and Systems Conference (NEWCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NEWCAS.2018.8585541\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 16th IEEE International New Circuits and Systems Conference (NEWCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NEWCAS.2018.8585541","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Template Attacks of a Masked S-Box Circuit: A Comparison Between Static and Dynamic Power Analyses
Static-power-based side-channel attacks have developed rapidly in the past few years. Many classical side channel attack algorithms have been adapted to exploit static power consumption. There have been successful applications of side-channel attacks based on static power dissipation of cryptographic circuits designed in different technology sizes. In this paper we perform template attacks on a masked s-box circuit designed and simulated using 45-nm CMOS standard cell library. We are the first to compare template attacks using static power and dynamic power in the context of masked sbox implementations. We are able to achieve successful results using both types of power leakage. However, we observe that, in the 45-nm environment, dynamic power analysis requires a high sampling rate for the oscilloscopes used to collect data, while the results of static power analysis are more sensitive to additive noise.