Skip to main content

DPA on Faulty Cryptographic Hardware and Countermeasures

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4236))

Abstract

Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reliability methods are used primarily only to ensure the correctness of the logical functionality and not the balance of a circuit. Due to the hardware redundancy in balanced gate designs, there are many faults which can imbalance a balanced gate without causing logical errors. As a result, traditional testing and reliability methods and architectures are unable to test and verify if a gate is completely defect and fault-free and hence balanced. Our simulations show that a few faulty balanced gates can make a circuit as vulnerable to power analysis attacks as a completely imbalanced implementation. This vulnerability opens the possibility of new methods of attacks based on a combination of fault and power attacks. A solution to the vulnerability based on a built-in differential self-balance comparator is presented.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: 28th European Solid-State Circuits Conference (ESSCIRC 2002), pp. 403–406 (September 2002)

    Google Scholar 

  2. Mace, F., Standaert, F.X., Quisquater, J.J., Legat, J.D.: A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. In: Paliouras, V., Vounckx, J., Verkest, D. (eds.) PATMOS 2005. LNCS, vol. 3728, pp. 550–560. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. MacDonald, D.J.: A Balanced-Power Domino-Style Standard Cell Library for Fine-Grain Asynchronous Pipelined Design to Resist Differential Power Analysis Attacks. Master of Science Thesis, Boston University, Boston (2005), Availabe at: http://reliable.bu.edu/Pro-jects/MacDonald_thesis.pdf

  4. Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resis-tant ASIC or FPGA Implementation. In: Design, Automation and Test in Europe Conference (DATE 2004), pp. 246–251 (February 2004)

    Google Scholar 

  5. Jaffe, J., Kocher, P., Jun, B.: Hardware-level mitigation and DPA countermeasures for cryptographic devices. US Patent 6654884

    Google Scholar 

  6. Karpovsky, M., Kulikowski, K., Taubin, A.: Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard. In: Proc. World Computing Congress, pp. 177–192 (2004)

    Google Scholar 

  7. Kulikowski, K., Karpovsky, M., Taubin, A.: Robust Codes for Fault Attack Resistant Cryptographic Hardware. In: Fault Diagnosis and Tolerance in Cryptography, 2nd International Workshop, Edinburgh (2005)

    Google Scholar 

  8. Karri, R., Kuznetsov, G., Gossel, M.: Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 113–124. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Coron, J.S., Naccache, D., Kocher, P.: Statistics and Secret Leakage. Trans. on Embedded Computing Sys. 3(3), 492–508 (2004)

    Article  Google Scholar 

  10. Rajsuman, R.: Iddq testing for CMOS VLSI. Proceedings of the IEEE 88(4), 544–568 (2000)

    Article  Google Scholar 

  11. Su, S.-T., Makki, R.Z., Nagle, T.: Transient power supply current monitoring - A new test method for CMOS VLSI circuits. Journal of Electronic Testing 6(1), 23–43 (1995)

    Article  Google Scholar 

  12. Gregorio, A.D.: Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. In: FTDC 2005 (2005)

    Google Scholar 

  13. Canovas, C., Clediere, J.: What do S-boxes Say in Differential Side Channel Attacks? IACR e-Print archive 2005/311 (2005)

    Google Scholar 

  14. FIPS PUB 197: Advanced Encryption Standard, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  15. Smirnov, A., Taubin, A., Karpovsky, M.: An Automated Fine-Grain Pipelining Using Domino Style Asynchronous Library. In: ACSD 2005: Fifth International Conference on Application of Concurrency to System Design (2005)

    Google Scholar 

  16. Smirnov, A.V., Kulikowski, K.J., Taubin, A.: Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 399–413. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kulikowski, K.J., Karpovsky, M.G., Taubin, A. (2006). DPA on Faulty Cryptographic Hardware and Countermeasures. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, JP. (eds) Fault Diagnosis and Tolerance in Cryptography. FDTC 2006. Lecture Notes in Computer Science, vol 4236. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11889700_19

Download citation

  • DOI: https://doi.org/10.1007/11889700_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46250-7

  • Online ISBN: 978-3-540-46251-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics