基于Intel 4 CMOS掩模同构复合域的4.7 ~ 5.3 gb /s故障注入和抗侧信道攻击AES-256引擎

IF 4.6 1区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Raghavan Kumar;Sachin Taneja;Vivek De;Sanu K. Mathew
{"title":"基于Intel 4 CMOS掩模同构复合域的4.7 ~ 5.3 gb /s故障注入和抗侧信道攻击AES-256引擎","authors":"Raghavan Kumar;Sachin Taneja;Vivek De;Sanu K. Mathew","doi":"10.1109/JSSC.2025.3541573","DOIUrl":null,"url":null,"abstract":"Physical attacks such as fault-injection attacks (FIAs) and side-channel attacks (SCAs) offer powerful adversarial tools to malicious parties that severely degrade the security offered by cryptographic ciphers. Laser FIA mounted on an unprotected advanced encryption standard (AES)-256 engine in Intel 4 CMOS process demonstrates a minimum-traces-to-disclosure (MTD) of 37M encryptions to generate eight exploitable ciphertexts, reducing AES key search space to a single guess with differential fault analysis (DFA). Power SCA offers a more powerful tool, enabling extraction of all key bytes through correlation power analysis (CPA) of 25k current traces. In this article, we present a unified FIA and SCA-resistant AES-256 engine fabricated in Intel 4 CMOS. Redundant AES round computations using isomorphic GF(<inline-formula> <tex-math>$2{^{4}}$ </tex-math></inline-formula>)2 composite-field representations and reconfigurable byte dataflows enable real-time detection of corrupted ciphertext with a fault-coverage of 99.3% and <inline-formula> <tex-math>$143{\\times }$ </tex-math></inline-formula> improvement in MTD while limiting area overhead to 12%. FIA-resistant configurations with 1/2/3 redundant rounds generate AES-256 throughput of 5.3/4.98/4.7 Gb/s, incurring a performance overhead of 13%/18%/23% compared to an unprotected AES. Undervoltage attack measurements show fault coverage of 99.98%, representing a <inline-formula> <tex-math>$5000{\\times }$ </tex-math></inline-formula> MTD improvement. Random additive-masking circuits with redundant composite-field computations demonstrate a measured MTD of >1 billion encryption traces.","PeriodicalId":13129,"journal":{"name":"IEEE Journal of Solid-state Circuits","volume":"60 4","pages":"1349-1358"},"PeriodicalIF":4.6000,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A 4.7-to-5.3-Gb/s Fault-Injection and Side-Channel Attack-Resistant AES-256 Engine Using Masked Isomorphic Composite Fields in Intel 4 CMOS\",\"authors\":\"Raghavan Kumar;Sachin Taneja;Vivek De;Sanu K. Mathew\",\"doi\":\"10.1109/JSSC.2025.3541573\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical attacks such as fault-injection attacks (FIAs) and side-channel attacks (SCAs) offer powerful adversarial tools to malicious parties that severely degrade the security offered by cryptographic ciphers. Laser FIA mounted on an unprotected advanced encryption standard (AES)-256 engine in Intel 4 CMOS process demonstrates a minimum-traces-to-disclosure (MTD) of 37M encryptions to generate eight exploitable ciphertexts, reducing AES key search space to a single guess with differential fault analysis (DFA). Power SCA offers a more powerful tool, enabling extraction of all key bytes through correlation power analysis (CPA) of 25k current traces. In this article, we present a unified FIA and SCA-resistant AES-256 engine fabricated in Intel 4 CMOS. Redundant AES round computations using isomorphic GF(<inline-formula> <tex-math>$2{^{4}}$ </tex-math></inline-formula>)2 composite-field representations and reconfigurable byte dataflows enable real-time detection of corrupted ciphertext with a fault-coverage of 99.3% and <inline-formula> <tex-math>$143{\\\\times }$ </tex-math></inline-formula> improvement in MTD while limiting area overhead to 12%. FIA-resistant configurations with 1/2/3 redundant rounds generate AES-256 throughput of 5.3/4.98/4.7 Gb/s, incurring a performance overhead of 13%/18%/23% compared to an unprotected AES. Undervoltage attack measurements show fault coverage of 99.98%, representing a <inline-formula> <tex-math>$5000{\\\\times }$ </tex-math></inline-formula> MTD improvement. Random additive-masking circuits with redundant composite-field computations demonstrate a measured MTD of >1 billion encryption traces.\",\"PeriodicalId\":13129,\"journal\":{\"name\":\"IEEE Journal of Solid-state Circuits\",\"volume\":\"60 4\",\"pages\":\"1349-1358\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-02-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Journal of Solid-state Circuits\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10907922/\",\"RegionNum\":1,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Journal of Solid-state Circuits","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10907922/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

物理攻击,如故障注入攻击(FIAs)和侧信道攻击(sca),为恶意方提供了强大的对抗工具,严重降低了加密密码所提供的安全性。激光FIA安装在英特尔4 CMOS工艺中无保护的高级加密标准(AES)-256引擎上,演示了37M加密的最小追踪到披露(MTD),以生成8个可利用的密文,通过差分故障分析(DFA)将AES密钥搜索空间减少到单个猜测。Power SCA提供了一个更强大的工具,可以通过25k电流走线的相关功率分析(CPA)提取所有关键字节。在本文中,我们提出了一个统一的FIA和sca抗AES-256引擎在英特尔4 CMOS制造。使用同构GF($2{^{4}}$)2复合字段表示和可重构字节数据流的冗余AES轮算能够实时检测损坏的密文,故障覆盖率为99.3%,MTD提高了$143{\times}$,同时将区域开销限制在12%。具有1/2/3冗余轮的抗AES配置生成5.3/4.98/4.7 Gb/s的AES-256吞吐量,与未受保护的AES相比,产生13%/18%/23%的性能开销。欠压攻击测量显示故障覆盖率为99.98%,代表了$5000{\times}$ MTD的改进。具有冗余复合场计算的随机加性屏蔽电路的MTD测量值为1010亿。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A 4.7-to-5.3-Gb/s Fault-Injection and Side-Channel Attack-Resistant AES-256 Engine Using Masked Isomorphic Composite Fields in Intel 4 CMOS
Physical attacks such as fault-injection attacks (FIAs) and side-channel attacks (SCAs) offer powerful adversarial tools to malicious parties that severely degrade the security offered by cryptographic ciphers. Laser FIA mounted on an unprotected advanced encryption standard (AES)-256 engine in Intel 4 CMOS process demonstrates a minimum-traces-to-disclosure (MTD) of 37M encryptions to generate eight exploitable ciphertexts, reducing AES key search space to a single guess with differential fault analysis (DFA). Power SCA offers a more powerful tool, enabling extraction of all key bytes through correlation power analysis (CPA) of 25k current traces. In this article, we present a unified FIA and SCA-resistant AES-256 engine fabricated in Intel 4 CMOS. Redundant AES round computations using isomorphic GF( $2{^{4}}$ )2 composite-field representations and reconfigurable byte dataflows enable real-time detection of corrupted ciphertext with a fault-coverage of 99.3% and $143{\times }$ improvement in MTD while limiting area overhead to 12%. FIA-resistant configurations with 1/2/3 redundant rounds generate AES-256 throughput of 5.3/4.98/4.7 Gb/s, incurring a performance overhead of 13%/18%/23% compared to an unprotected AES. Undervoltage attack measurements show fault coverage of 99.98%, representing a $5000{\times }$ MTD improvement. Random additive-masking circuits with redundant composite-field computations demonstrate a measured MTD of >1 billion encryption traces.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Journal of Solid-state Circuits
IEEE Journal of Solid-state Circuits 工程技术-工程:电子与电气
CiteScore
11.00
自引率
20.40%
发文量
351
审稿时长
3-6 weeks
期刊介绍: The IEEE Journal of Solid-State Circuits publishes papers each month in the broad area of solid-state circuits with particular emphasis on transistor-level design of integrated circuits. It also provides coverage of topics such as circuits modeling, technology, systems design, layout, and testing that relate directly to IC design. Integrated circuits and VLSI are of principal interest; material related to discrete circuit design is seldom published. Experimental verification is strongly encouraged.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信