基于逻辑状态的泄漏功率分析

S. Dhanuskodi, S. Keshavarz, Daniel E. Holcomb
{"title":"基于逻辑状态的泄漏功率分析","authors":"S. Dhanuskodi, S. Keshavarz, Daniel E. Holcomb","doi":"10.1109/ISVLSI.2016.121","DOIUrl":null,"url":null,"abstract":"Numerous side-channel attacks on integrated circuit implementations of cryptographic systems have been demonstrated in literature. Insecure implementations can reveal secret information through data dependencies in dynamic and leakage power profiles. Side-channel resistant logic styles are effective against dynamic power analysis attacks, but are suggested to exhibit weaknesses against the less common Leakage Power Analysis (LPA) attacks. We present a novel LPA attack that uses knowledge of a circuit's internal structure to mount a stronger attack via the leakage power side-channel, and show that even dual-rail side-channel resistant logic styles are susceptible to these LPA attacks. Our proposed LPA attack can successfullyextract secret key information from S-boxes even in the presenceof large amounts of random on-chip noise, and in scenarioswhere Hamming-weight based techniques are unsuitable. We alsoevaluate the impact of process variations on our scheme, andpropose strategies for mitigating this impact.","PeriodicalId":140647,"journal":{"name":"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"LLPA: Logic State Based Leakage Power Analysis\",\"authors\":\"S. Dhanuskodi, S. Keshavarz, Daniel E. Holcomb\",\"doi\":\"10.1109/ISVLSI.2016.121\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Numerous side-channel attacks on integrated circuit implementations of cryptographic systems have been demonstrated in literature. Insecure implementations can reveal secret information through data dependencies in dynamic and leakage power profiles. Side-channel resistant logic styles are effective against dynamic power analysis attacks, but are suggested to exhibit weaknesses against the less common Leakage Power Analysis (LPA) attacks. We present a novel LPA attack that uses knowledge of a circuit's internal structure to mount a stronger attack via the leakage power side-channel, and show that even dual-rail side-channel resistant logic styles are susceptible to these LPA attacks. Our proposed LPA attack can successfullyextract secret key information from S-boxes even in the presenceof large amounts of random on-chip noise, and in scenarioswhere Hamming-weight based techniques are unsuitable. We alsoevaluate the impact of process variations on our scheme, andpropose strategies for mitigating this impact.\",\"PeriodicalId\":140647,\"journal\":{\"name\":\"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISVLSI.2016.121\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISVLSI.2016.121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

许多侧信道攻击的集成电路实现的密码系统已经证明了在文献。不安全的实现可以通过动态和泄漏功率配置文件中的数据依赖关系泄露机密信息。侧通道抗逻辑风格对动态功率分析攻击有效,但建议在不太常见的泄漏功率分析(LPA)攻击中表现出弱点。我们提出了一种新的LPA攻击,该攻击利用电路内部结构的知识通过泄漏功率侧通道进行更强的攻击,并表明即使是双轨侧通道抗逻辑样式也容易受到这些LPA攻击。我们提出的LPA攻击可以成功地从s盒中提取密钥信息,即使在存在大量随机芯片上噪声的情况下,以及在基于汉明权重的技术不适合的情况下。我们还评估了工艺变化对我们方案的影响,并提出了减轻这种影响的策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
LLPA: Logic State Based Leakage Power Analysis
Numerous side-channel attacks on integrated circuit implementations of cryptographic systems have been demonstrated in literature. Insecure implementations can reveal secret information through data dependencies in dynamic and leakage power profiles. Side-channel resistant logic styles are effective against dynamic power analysis attacks, but are suggested to exhibit weaknesses against the less common Leakage Power Analysis (LPA) attacks. We present a novel LPA attack that uses knowledge of a circuit's internal structure to mount a stronger attack via the leakage power side-channel, and show that even dual-rail side-channel resistant logic styles are susceptible to these LPA attacks. Our proposed LPA attack can successfullyextract secret key information from S-boxes even in the presenceof large amounts of random on-chip noise, and in scenarioswhere Hamming-weight based techniques are unsuitable. We alsoevaluate the impact of process variations on our scheme, andpropose strategies for mitigating this impact.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信