首页> 外文会议>IEEE International Symposium on Hardware Oriented Security and Trust >Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
【24h】

Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers

机译:从轻量级密码的全面展开实施中提取侧信道泄漏

获取原文

摘要

Energy efficiency and security is a critical requirement for computing at edge nodes. Unrolled architectures for lightweight cryptographic algorithms have been shown to be energy-efficient, providing higher performance while meeting resource constraints. Hardware implementations of unrolled datapaths have also been shown to be resistant to side channel analysis (SCA) attacks due to a reduction in signal-to-noise ratio (SNR) and an increased complexity in the leakage model. This paper demonstrates optimal leakage models and an improved CFA attack which makes it feasible to extract first-order side-channel leakages from combinational logic in the initial rounds of unrolled datapaths. Several leakage models, targeting initial rounds, are explored and 1-bit hamming weight (HW) based leakage model is shown to be an optimal choice. Additionally, multi-band narrow bandpass filtering techniques in conjunction with correlation frequency analysis (CFA) is demonstrated to improve SNR by up to 4×, attributed to the removal of the misalignment effect in combinational logics and signal isolation. The improved CFA attack is performed on side channel signatures acquired for 7-round unrolled SIMON datapaths, implemented on Sakura-G (XILINX spartan 6, 45nm) based FPGA platform and a 24× reduction in minimum-traces-to-disclose (MTD) for revealing 80% of the key bits is demonstrated with respect to conventional time domain correlation power analysis (CPA). Finally, the proposed method is successfully applied to a fully-unrolled datapath for PRINCE and a parallel round-based datapath for Advanced Encryption Standard (AES) algorithm to demonstrate its general applicability.
机译:能源效率和安全性是边缘节点计算的关键要求。轻量级密码算法的展开架构已被证明具有能源效率,可在满足资源限制的同时提供更高的性能。由于降低了信噪比(SNR)和增加了泄漏模型的复杂性,展开数据路径的硬件实现也被证明可以抵抗边信道分析(SCA)攻击。本文演示了最佳泄漏模型和改进的CFA攻击,这使得在展开数据路径的初始轮次中从组合逻辑中提取一阶边通道泄漏成为可能。探索了针对初始回合的几种泄漏模型,并且基于1位汉明权重(HW)的泄漏模型被证明是最佳选择。此外,多频带窄带通滤波技术与相关频率分析(CFA)结合使用,可将SNR提高4倍,这归因于消除了组合逻辑和信号隔离中的未对准效应。改进的CFA攻击是针对在基于Sakura-G(XILINX spartan 6,45nm)的FPGA平台上实现的为7轮展开SIMON数据路径获取的侧通道签名执行的,最小迹线至披露(MTD)减少了24倍相对于常规时域相关功率分析(CPA)展示了用于揭示80%的关键比特的方法。最后,将所提出的方法成功应用于PRINCE的完全展开数据路径和高级加密标准(AES)算法的基于并行轮次的数据路径,以证明其一般适用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号