基于相关功率分析的可变时钟密码IC随机化处理的基础研究

Megumi Saito, T. Mizuki, H. Sone, Yu-ichi Hayashi
{"title":"基于相关功率分析的可变时钟密码IC随机化处理的基础研究","authors":"Megumi Saito, T. Mizuki, H. Sone, Yu-ichi Hayashi","doi":"10.1109/EMCCOMPO.2015.7358327","DOIUrl":null,"url":null,"abstract":"Correlation Power Analysis (CPA) is one of the typical side-channel analyses targeting cryptographic IC. CPA calculates the Poisson correlation function between transient currents (which are generated from a cryptographic IC depending on the processed data) and hypothetical current values and then recovers the secret key from a high number of correlation computations. Countermeasures against side-channel attacks mainly focus on algorithms and architecture at the design levels. These methods suffer from some problems, e.g., increase in processing time and circuit scale. This paper discusses a countermeasure against CPA, which can be relatively inexpensively and easily implemented. CPA calculates the correlation value between the transient current waveforms and hypothetical current values under the assumption that the specific process that leaks the secret key information is always performed after a certain time from the time when the cryptographic IC starts performing encryption or decryption and recovers the secret key. Therefore, we consider the possibility of randomizing the time when a cryptographic IC runs the process where the secret key information is leaked to suppress the leakage of side-channel information available in recovering the secret key. In this paper, we propose a method of changing the clock frequencies for each encryption or decryption to randomize the time. In our experiment, we employed Side-channel Attack Standard Evaluation Board (SASEBO-G) and implemented Advanced Encryption Standard (AES) on a field-programmable gate array (FPGA) of SASEBO-G. We measured the transient currents in a cryptographic FPGA that was supplied a spread-spectrum clock while it performs AES encryption. We calculated the correlation value between each transient current waveform and a hypothetical current value and demonstrated that this process is effective as a countermeasure against CPA.","PeriodicalId":236992,"journal":{"name":"2015 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis\",\"authors\":\"Megumi Saito, T. Mizuki, H. Sone, Yu-ichi Hayashi\",\"doi\":\"10.1109/EMCCOMPO.2015.7358327\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Correlation Power Analysis (CPA) is one of the typical side-channel analyses targeting cryptographic IC. CPA calculates the Poisson correlation function between transient currents (which are generated from a cryptographic IC depending on the processed data) and hypothetical current values and then recovers the secret key from a high number of correlation computations. Countermeasures against side-channel attacks mainly focus on algorithms and architecture at the design levels. These methods suffer from some problems, e.g., increase in processing time and circuit scale. This paper discusses a countermeasure against CPA, which can be relatively inexpensively and easily implemented. CPA calculates the correlation value between the transient current waveforms and hypothetical current values under the assumption that the specific process that leaks the secret key information is always performed after a certain time from the time when the cryptographic IC starts performing encryption or decryption and recovers the secret key. Therefore, we consider the possibility of randomizing the time when a cryptographic IC runs the process where the secret key information is leaked to suppress the leakage of side-channel information available in recovering the secret key. In this paper, we propose a method of changing the clock frequencies for each encryption or decryption to randomize the time. In our experiment, we employed Side-channel Attack Standard Evaluation Board (SASEBO-G) and implemented Advanced Encryption Standard (AES) on a field-programmable gate array (FPGA) of SASEBO-G. We measured the transient currents in a cryptographic FPGA that was supplied a spread-spectrum clock while it performs AES encryption. We calculated the correlation value between each transient current waveform and a hypothetical current value and demonstrated that this process is effective as a countermeasure against CPA.\",\"PeriodicalId\":236992,\"journal\":{\"name\":\"2015 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo)\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EMCCOMPO.2015.7358327\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EMCCOMPO.2015.7358327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

相关功率分析(CPA)是针对加密集成电路的一种典型的侧信道分析方法。CPA计算瞬态电流(根据处理的数据由加密集成电路产生)与假设电流值之间的泊松相关函数,然后通过大量的相关计算恢复密钥。针对侧信道攻击的对策主要集中在设计层面的算法和体系结构。这些方法存在处理时间长、电路规模大等问题。本文讨论了一种成本相对较低且易于实现的对抗CPA的对策。CPA计算瞬态电流波形与假设电流值之间的相关值,假设泄露密钥信息的特定过程总是在加密IC开始执行加密或解密并恢复密钥后的一段时间后进行。因此,我们考虑随机化加密IC运行密钥信息泄露过程的时间的可能性,以抑制在恢复密钥时可用的侧信道信息的泄漏。在本文中,我们提出了一种方法来改变时钟频率为每次加密或解密随机化的时间。在我们的实验中,我们采用了侧信道攻击标准评估板(SASEBO-G),并在SASEBO-G的现场可编程门阵列(FPGA)上实现了高级加密标准(AES)。我们测量了加密FPGA中的瞬态电流,该FPGA在执行AES加密时提供了扩频时钟。我们计算了每个暂态电流波形与假设电流值之间的相关值,并证明了该过程是有效的对抗CPA的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis
Correlation Power Analysis (CPA) is one of the typical side-channel analyses targeting cryptographic IC. CPA calculates the Poisson correlation function between transient currents (which are generated from a cryptographic IC depending on the processed data) and hypothetical current values and then recovers the secret key from a high number of correlation computations. Countermeasures against side-channel attacks mainly focus on algorithms and architecture at the design levels. These methods suffer from some problems, e.g., increase in processing time and circuit scale. This paper discusses a countermeasure against CPA, which can be relatively inexpensively and easily implemented. CPA calculates the correlation value between the transient current waveforms and hypothetical current values under the assumption that the specific process that leaks the secret key information is always performed after a certain time from the time when the cryptographic IC starts performing encryption or decryption and recovers the secret key. Therefore, we consider the possibility of randomizing the time when a cryptographic IC runs the process where the secret key information is leaked to suppress the leakage of side-channel information available in recovering the secret key. In this paper, we propose a method of changing the clock frequencies for each encryption or decryption to randomize the time. In our experiment, we employed Side-channel Attack Standard Evaluation Board (SASEBO-G) and implemented Advanced Encryption Standard (AES) on a field-programmable gate array (FPGA) of SASEBO-G. We measured the transient currents in a cryptographic FPGA that was supplied a spread-spectrum clock while it performs AES encryption. We calculated the correlation value between each transient current waveform and a hypothetical current value and demonstrated that this process is effective as a countermeasure against CPA.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信