Raghavan Kumar;Sachin Taneja;Vivek De;Sanu K. Mathew
{"title":"基于Intel 4 CMOS掩模同构复合域的4.7 ~ 5.3 gb /s故障注入和抗侧信道攻击AES-256引擎","authors":"Raghavan Kumar;Sachin Taneja;Vivek De;Sanu K. Mathew","doi":"10.1109/JSSC.2025.3541573","DOIUrl":null,"url":null,"abstract":"Physical attacks such as fault-injection attacks (FIAs) and side-channel attacks (SCAs) offer powerful adversarial tools to malicious parties that severely degrade the security offered by cryptographic ciphers. Laser FIA mounted on an unprotected advanced encryption standard (AES)-256 engine in Intel 4 CMOS process demonstrates a minimum-traces-to-disclosure (MTD) of 37M encryptions to generate eight exploitable ciphertexts, reducing AES key search space to a single guess with differential fault analysis (DFA). Power SCA offers a more powerful tool, enabling extraction of all key bytes through correlation power analysis (CPA) of 25k current traces. In this article, we present a unified FIA and SCA-resistant AES-256 engine fabricated in Intel 4 CMOS. Redundant AES round computations using isomorphic GF(<inline-formula> <tex-math>$2{^{4}}$ </tex-math></inline-formula>)2 composite-field representations and reconfigurable byte dataflows enable real-time detection of corrupted ciphertext with a fault-coverage of 99.3% and <inline-formula> <tex-math>$143{\\times }$ </tex-math></inline-formula> improvement in MTD while limiting area overhead to 12%. FIA-resistant configurations with 1/2/3 redundant rounds generate AES-256 throughput of 5.3/4.98/4.7 Gb/s, incurring a performance overhead of 13%/18%/23% compared to an unprotected AES. Undervoltage attack measurements show fault coverage of 99.98%, representing a <inline-formula> <tex-math>$5000{\\times }$ </tex-math></inline-formula> MTD improvement. Random additive-masking circuits with redundant composite-field computations demonstrate a measured MTD of >1 billion encryption traces.","PeriodicalId":13129,"journal":{"name":"IEEE Journal of Solid-state Circuits","volume":"60 4","pages":"1349-1358"},"PeriodicalIF":4.6000,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A 4.7-to-5.3-Gb/s Fault-Injection and Side-Channel Attack-Resistant AES-256 Engine Using Masked Isomorphic Composite Fields in Intel 4 CMOS\",\"authors\":\"Raghavan Kumar;Sachin Taneja;Vivek De;Sanu K. Mathew\",\"doi\":\"10.1109/JSSC.2025.3541573\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical attacks such as fault-injection attacks (FIAs) and side-channel attacks (SCAs) offer powerful adversarial tools to malicious parties that severely degrade the security offered by cryptographic ciphers. Laser FIA mounted on an unprotected advanced encryption standard (AES)-256 engine in Intel 4 CMOS process demonstrates a minimum-traces-to-disclosure (MTD) of 37M encryptions to generate eight exploitable ciphertexts, reducing AES key search space to a single guess with differential fault analysis (DFA). Power SCA offers a more powerful tool, enabling extraction of all key bytes through correlation power analysis (CPA) of 25k current traces. In this article, we present a unified FIA and SCA-resistant AES-256 engine fabricated in Intel 4 CMOS. Redundant AES round computations using isomorphic GF(<inline-formula> <tex-math>$2{^{4}}$ </tex-math></inline-formula>)2 composite-field representations and reconfigurable byte dataflows enable real-time detection of corrupted ciphertext with a fault-coverage of 99.3% and <inline-formula> <tex-math>$143{\\\\times }$ </tex-math></inline-formula> improvement in MTD while limiting area overhead to 12%. FIA-resistant configurations with 1/2/3 redundant rounds generate AES-256 throughput of 5.3/4.98/4.7 Gb/s, incurring a performance overhead of 13%/18%/23% compared to an unprotected AES. Undervoltage attack measurements show fault coverage of 99.98%, representing a <inline-formula> <tex-math>$5000{\\\\times }$ </tex-math></inline-formula> MTD improvement. Random additive-masking circuits with redundant composite-field computations demonstrate a measured MTD of >1 billion encryption traces.\",\"PeriodicalId\":13129,\"journal\":{\"name\":\"IEEE Journal of Solid-state Circuits\",\"volume\":\"60 4\",\"pages\":\"1349-1358\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-02-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Journal of Solid-state Circuits\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10907922/\",\"RegionNum\":1,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Journal of Solid-state Circuits","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10907922/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
A 4.7-to-5.3-Gb/s Fault-Injection and Side-Channel Attack-Resistant AES-256 Engine Using Masked Isomorphic Composite Fields in Intel 4 CMOS
Physical attacks such as fault-injection attacks (FIAs) and side-channel attacks (SCAs) offer powerful adversarial tools to malicious parties that severely degrade the security offered by cryptographic ciphers. Laser FIA mounted on an unprotected advanced encryption standard (AES)-256 engine in Intel 4 CMOS process demonstrates a minimum-traces-to-disclosure (MTD) of 37M encryptions to generate eight exploitable ciphertexts, reducing AES key search space to a single guess with differential fault analysis (DFA). Power SCA offers a more powerful tool, enabling extraction of all key bytes through correlation power analysis (CPA) of 25k current traces. In this article, we present a unified FIA and SCA-resistant AES-256 engine fabricated in Intel 4 CMOS. Redundant AES round computations using isomorphic GF($2{^{4}}$ )2 composite-field representations and reconfigurable byte dataflows enable real-time detection of corrupted ciphertext with a fault-coverage of 99.3% and $143{\times }$ improvement in MTD while limiting area overhead to 12%. FIA-resistant configurations with 1/2/3 redundant rounds generate AES-256 throughput of 5.3/4.98/4.7 Gb/s, incurring a performance overhead of 13%/18%/23% compared to an unprotected AES. Undervoltage attack measurements show fault coverage of 99.98%, representing a $5000{\times }$ MTD improvement. Random additive-masking circuits with redundant composite-field computations demonstrate a measured MTD of >1 billion encryption traces.
期刊介绍:
The IEEE Journal of Solid-State Circuits publishes papers each month in the broad area of solid-state circuits with particular emphasis on transistor-level design of integrated circuits. It also provides coverage of topics such as circuits modeling, technology, systems design, layout, and testing that relate directly to IC design. Integrated circuits and VLSI are of principal interest; material related to discrete circuit design is seldom published. Experimental verification is strongly encouraged.