Skip to main content
Log in

Key Update Countermeasure for Correlation-Based Side-Channel Attacks

  • Published:
Journal of Hardware and Systems Security Aims and scope Submit manuscript

Abstract

Side-channel analysis is a non-invasive form of attack that reveals the secret key of the cryptographic circuit by analyzing the leaked physical information. The traditional brute-force and cryptanalysis attacks target the weakness in the encryption algorithm, whereas side-channel attacks use statistical models such as differential analysis and correlation analysis on the leaked information gained from the cryptographic device during the run-time. As a non-invasive and passive attack, the side-channel attack brings a lot of difficulties for detection and defense. In this work, we propose a key update scheme as a countermeasure for power and electromagnetic analysis-based attacks on the cryptographic device. The proposed countermeasure utilizes a secure coprocessor to provide secure key generation and storage in a trusted environment. The experimental results show that the proposed key update scheme can mitigate side-channel attacks significantly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Advances in cryptology — CRYPTO ’96, vol 1109, pp 104–113. https://doi.org/10.1007/3-540-68697-5_9

  2. Fournaris AP, Koufopavlou O (2012) Protecting CRT RSA against fault and power side channel attacks. In: 2012 IEEE Computer Society Annual Symposium on VLSI, pp 159–164. https://doi.org/10.1109/isvlsi.2012.54

  3. Prouff E, Rivain M (2013) Masking against side-channel attacks: a formal security proof. In: Advances in cryptology - EUROCRYPT 2013, vol 7881, pp 142–159. https://doi.org/10.1007/978-3-642-38348-9_9

  4. Masoumi M, Habibi P, Jadidi M (2015) Efficient implementation of masked AES on side-channel attack standard evaluation board. In: 2015 International Conference on Information Society (i-Society), pp 151-156. https://doi.org/10.1109/i-society.2015.7366878

  5. United States National Institute of Standards and Technology (NIST) (2001) Announcing the Advanced Encryption Standard (AES). In: Federal Information Processing Standards Publication 197

  6. Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology — CRYPTO ’99, vol 1666, pp 388–397. https://doi.org/10.1007/3-540-48405-1_25

  7. Nomata Y, Matsubayashi M, Sawada K, Satoh A (2016) Comparison of side-channel attack on cryptographic cirucits between old and new technology FPGAs. In: 2016 IEEE 5th Global Conference on Consumer Electronics, pp 1–4. https://doi.org/10.1109/gcce.2016.7800555

  8. Gandolfi K, Mourtel C, Olivier F (2001) Electromagnetic analysis: concrete results. In: Cryptographic hardware and embedded systems - CHES 2001, vol 2162, pp 251–261. https://doi.org/10.1007/3-540-44709-1_21

  9. Ling Z, Luo J, Zhang Y, Yang M, Fu X, Yu W (2012) A novel network delay based side-channel attack: modeling and defense. In: 2012 Proceedings IEEE INFOCOM, pp 2390–2398. https://doi.org/10.1109/INFCOM.2012.6195628

  10. Lohrke H, Tajik S, Krachenfels T, Boit C, Seifert JP (2018) Key extraction using thermal laser stimulation: a case study on Xilinx Ultrascale FPGAs. In: Cryptology ePrint Archive, Report 2018/717. https://eprint.iacr.org/2018/717

  11. Brier E, Clavier C, Olivier F (2004) Correlation power analysis with a leakage model. In: Cryptographic hardware and embedded systems - CHES 2004, vol 3156, pp 16–29. https://doi.org/10.1007/978-3-540-28632-5_2

  12. Bu A, Dai W, Lu M, Cai H, Shan W (2018) Correlation-based electromagnetic analysis attack using Haar wavelet reconstruction with low-pass filtering on an FPGA implementaion of AES. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp 1897–1900. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00288

  13. Mulder E D, Eisenbarth T, Schaumont P (2018) Identifying and eliminating side-channel leaks in programmable systems, vol 35, pp 74–89, https://doi.org/10.1109/mdat.2017.2766166

  14. Madlener F, Sotttinger M, Huss SA (2009) Novel hardening techniques against differential power analysis for multiplication in GF(2n). In: 2009 International Conference on Field-Programmable Technology, pp 328–334. https://doi.org/10.1109/fpt.2009.5377676

  15. Huss SA, Sotttinger M (2017) A novel mutating runtime architecture for embedding multiple countermeasures against side-channel attacks. In: Hardware IP security and trust, pp 165-184. https://doi.org/10.1007/978-3-319-49025-0_8

  16. Popp T, Mangard S (2005) Masked dual-rail pre-charge logic: DPA-resistance without routing constraints. In: Cryptographic hardware and embedded systems – CHES 2005, pp 172-186. https://doi.org/10.1007/11545262_13

  17. Tiri K, Akmal M, Verbauwhede I (2002) A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In: Proceedings of the 28th European Solid-State Circuits Conference, pp 403–406. https://ieeexplore.ieee.org/document/1471550

  18. Hwang D D, Tiri K, Hodjat A, Lai B C, Yang S, Schaumont P, Verbauwhede I (2006) AES-based security coprocessor IC in 0.18-muhboxmCMOS with resistance to differential power analysis side-channel attacks, vol 41, pp 781–792, https://doi.org/10.1109/JSSC.2006.870913

  19. Mankar P (2017) Key updating for leakage resiliency with application to Shannon security OTP and AES modes of operation. In:2017 International Conference on IoT and Application (ICIOT), pp 1–4. https://doi.org/10.1109/ICIOTA.2017.8073631

  20. Medwed M, Standaert F, Großschädl J, Regazzoni F (2010) Fresh re-keying: security against side-channel and fault attacks for low-cost devices. In: Progress in cryptology - AFRICACRYPT 2010, pp 279–296. https://doi.org/10.1007/978-3-642-12678-9_17

  21. Medwed M, Petit C, Regazzoni F, Renauld M, Standaert F (2011) Fresh re-keying II: securing multiple parties against side-channel and fault attacks. In: Smart card research and advanced applications, pp 115–132. https://doi.org/10.1007/978-3-642-27257-8_8

  22. Xi X, Aysu A, Orshansky M (2018) Fresh re-keying with strong PUFs: a new approach to side-channel security. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp 118–125. https://doi.org/10.1109/hst.2018.8383899

  23. Nikova S, Rechberger C, Rijmen V (2006) Threshold implementations against side-channel attacks and glitches. In: ICICS 2006: information and communications security, pp 69–83. https://doi.org/10.1007/11935308_38

  24. Trusted Computing Group (2011) TPM structures. https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf. Accessed 27 February 2019

  25. Gui Y, Siddiqui A S, Saqib F (2018) Hardware based root of trust for electronic control units, vol 2018, pp 1–7, https://doi.org/10.1109/SECON.2018.8479266

  26. Siddiqui A S, Gui Y, Lawrence D, Laval S, Plusquellic J, Manjrekar M, Chowdhury B, Saqib F (2018) Hardware assisted security architecture for smart grid, vol 2018, pp 2890–2895, https://doi.org/10.1109/IECON.2018.8591401

  27. Messerges TS, Dabbish EA, Sloan RH (1999) Investigations of power analysis attacks on smartcards. In: Proceedings of USENIX Workshop on Smartcard Technology, pp 151–161

  28. Jin Y (2015) Introduction to hardware security, vol 4, pp 763–784, https://doi.org/10.3390/electronics4040763

  29. Rosenfeld K, Karri R (2010) Attacks and defenses for JTAG, vol 27, pp 36–47, https://doi.org/10.1109/MDT.2010.9

  30. Intel (2018) The TPM2 software stack: introducing a major open source release. https://software.intel.com/en-us/blogs/2018/08/29/tpm2-software-stack-open-source Accessed 04 October 2019

  31. IBM (2019) IBM’s TPM 2.0 TSS. https://sourceforge.net/projects/ibmtpm20tss/ Accessed 04 Oct 2019

  32. Satoh Laboratory (2014) SAKURA-X. http://satoh.cs.uec.ac.jp/SAKURA/hardware/SAKURA-X.html Accessed 11 March 2019

  33. RF BAY INC (2006) LNA-1050. http://www.rfbayinc.com/upload/files/lna/lna-1050.pdf Accessed 11 March 2019

  34. Tektronix (2013) DPO/DSA/MSO70000 Series Oscilloscopes. http://download.tek.com/document/55W-22447-9.pdf Accessed 11 March 2019

  35. Keysight (formerly Agilent’s Electronic Measurement) (2007) E3612A 30W Power Supply, 60V, 0.5A or 120V, 0.25A. https://www.keysight.com/en/pd-838247-pn-E3612A Accessed 11 March 2019

  36. Keysight (2018) N2862B Passive Probe, 10:1, 150 MHz, 1.2 m. https://www.keysight.com/en/pd-1938439-pn-N2862B/

  37. ChipWhisperer Wiki (2018) CW505 Planar H-Field Probe. https://wiki.newae.com/CW50_Planar_H-Field_Probe Accessed 11 March 2019

  38. Infineon (2017) IRIDIUM SLB 9670 TPM2.0 LINUX. https://www.infineon.com/cms/en/product/evaluation-boards/iridium9670-tpm2.0-linux Accessed 16 March 2019

  39. Suciu A, Carean T (2010) Benchmarking the true random number generator of TPM chips. In: CoRR. arXiv:1008.2223 Accessed 10 April 2019

  40. Xilinx (2018) Using encryption and authentication to secure an UltraScale/UltraScale+ FPGA Bitstream. https://www.xilinx.com/support/documentation/application_notes/xapp1267-encryp-efuse-program.pdf Accessed 09 October 2019

  41. Trusted Computing Group (2013) Endorsement Key (EK) and Platform Certificate Enrollment Specification Frequently Asked Questions. https://trustedcomputinggroup.org/wp-content/uploads/IWG-EK-CMC-enrollment-for-TPM-v1-2-FAQ-rev-April-3-2013.pdf

  42. Wang A, Wang C, Zheng X, Tian W, Xu R, Zhang G (2017) Random key rotation: side-channel countermeasure of NTRU cryptosystem for resource-limited devices. Computers & Electrical Engineering 63:220–231. https://doi.org/10.1016/j.compeleceng.2017.05.007

    Article  Google Scholar 

  43. Kalyanaraman M, Orshansky M (2013) Novel strong PUF based on nonlinearity of MOSFET subthreshold operation. In: 2013 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp 18–23. https://doi.org/10.1109/HST.2013.6581558

  44. Blömer J, Guajardo J, Krummel V (2004) Provably secure masking of AES. In: SAC 2004: selected areas in cryptography, pp 69–83. https://doi.org/10.1007/978-3-540-30564-4_5

  45. Moradi A, Poschmann A, Ling S, Paar C, Wang H (2011) Pushing the limits: a very compact and a threshold implementation of AES. In: Advances in Cryptology - EUROCRYPT 2011, pp 69–89. https://doi.org/10.1007/978-3-642-20465-4_6

  46. Infineon (2018) OPTIGATM TPM SLB 9670 TPM2.0 Data Sheet. https://www.infineon.com/dgdl/Infineon-data-sheet-SLB9670_2.0_Rev1.3-DS-v01_03-EN.pdf?fileId=5546d462689a790c016929ed3b5e4ffb Accessed 29 April 2019

Download references

Funding

This research has been sponsored by the National Science Foundation under Grant Nos. 1814420, 1819694, and 1819687.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yutian Gui.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gui, Y., Tamore, S.M., Siddiqui, A.S. et al. Key Update Countermeasure for Correlation-Based Side-Channel Attacks. J Hardw Syst Secur 4, 167–179 (2020). https://doi.org/10.1007/s41635-020-00094-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41635-020-00094-x

Keywords