Abstract
Side-channel analysis is a non-invasive form of attack that reveals the secret key of the cryptographic circuit by analyzing the leaked physical information. The traditional brute-force and cryptanalysis attacks target the weakness in the encryption algorithm, whereas side-channel attacks use statistical models such as differential analysis and correlation analysis on the leaked information gained from the cryptographic device during the run-time. As a non-invasive and passive attack, the side-channel attack brings a lot of difficulties for detection and defense. In this work, we propose a key update scheme as a countermeasure for power and electromagnetic analysis-based attacks on the cryptographic device. The proposed countermeasure utilizes a secure coprocessor to provide secure key generation and storage in a trusted environment. The experimental results show that the proposed key update scheme can mitigate side-channel attacks significantly.












Similar content being viewed by others
References
Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Advances in cryptology — CRYPTO ’96, vol 1109, pp 104–113. https://doi.org/10.1007/3-540-68697-5_9
Fournaris AP, Koufopavlou O (2012) Protecting CRT RSA against fault and power side channel attacks. In: 2012 IEEE Computer Society Annual Symposium on VLSI, pp 159–164. https://doi.org/10.1109/isvlsi.2012.54
Prouff E, Rivain M (2013) Masking against side-channel attacks: a formal security proof. In: Advances in cryptology - EUROCRYPT 2013, vol 7881, pp 142–159. https://doi.org/10.1007/978-3-642-38348-9_9
Masoumi M, Habibi P, Jadidi M (2015) Efficient implementation of masked AES on side-channel attack standard evaluation board. In: 2015 International Conference on Information Society (i-Society), pp 151-156. https://doi.org/10.1109/i-society.2015.7366878
United States National Institute of Standards and Technology (NIST) (2001) Announcing the Advanced Encryption Standard (AES). In: Federal Information Processing Standards Publication 197
Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology — CRYPTO ’99, vol 1666, pp 388–397. https://doi.org/10.1007/3-540-48405-1_25
Nomata Y, Matsubayashi M, Sawada K, Satoh A (2016) Comparison of side-channel attack on cryptographic cirucits between old and new technology FPGAs. In: 2016 IEEE 5th Global Conference on Consumer Electronics, pp 1–4. https://doi.org/10.1109/gcce.2016.7800555
Gandolfi K, Mourtel C, Olivier F (2001) Electromagnetic analysis: concrete results. In: Cryptographic hardware and embedded systems - CHES 2001, vol 2162, pp 251–261. https://doi.org/10.1007/3-540-44709-1_21
Ling Z, Luo J, Zhang Y, Yang M, Fu X, Yu W (2012) A novel network delay based side-channel attack: modeling and defense. In: 2012 Proceedings IEEE INFOCOM, pp 2390–2398. https://doi.org/10.1109/INFCOM.2012.6195628
Lohrke H, Tajik S, Krachenfels T, Boit C, Seifert JP (2018) Key extraction using thermal laser stimulation: a case study on Xilinx Ultrascale FPGAs. In: Cryptology ePrint Archive, Report 2018/717. https://eprint.iacr.org/2018/717
Brier E, Clavier C, Olivier F (2004) Correlation power analysis with a leakage model. In: Cryptographic hardware and embedded systems - CHES 2004, vol 3156, pp 16–29. https://doi.org/10.1007/978-3-540-28632-5_2
Bu A, Dai W, Lu M, Cai H, Shan W (2018) Correlation-based electromagnetic analysis attack using Haar wavelet reconstruction with low-pass filtering on an FPGA implementaion of AES. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp 1897–1900. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00288
Mulder E D, Eisenbarth T, Schaumont P (2018) Identifying and eliminating side-channel leaks in programmable systems, vol 35, pp 74–89, https://doi.org/10.1109/mdat.2017.2766166
Madlener F, Sotttinger M, Huss SA (2009) Novel hardening techniques against differential power analysis for multiplication in GF(2n). In: 2009 International Conference on Field-Programmable Technology, pp 328–334. https://doi.org/10.1109/fpt.2009.5377676
Huss SA, Sotttinger M (2017) A novel mutating runtime architecture for embedding multiple countermeasures against side-channel attacks. In: Hardware IP security and trust, pp 165-184. https://doi.org/10.1007/978-3-319-49025-0_8
Popp T, Mangard S (2005) Masked dual-rail pre-charge logic: DPA-resistance without routing constraints. In: Cryptographic hardware and embedded systems – CHES 2005, pp 172-186. https://doi.org/10.1007/11545262_13
Tiri K, Akmal M, Verbauwhede I (2002) A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In: Proceedings of the 28th European Solid-State Circuits Conference, pp 403–406. https://ieeexplore.ieee.org/document/1471550
Hwang D D, Tiri K, Hodjat A, Lai B C, Yang S, Schaumont P, Verbauwhede I (2006) AES-based security coprocessor IC in 0.18-muhboxmCMOS with resistance to differential power analysis side-channel attacks, vol 41, pp 781–792, https://doi.org/10.1109/JSSC.2006.870913
Mankar P (2017) Key updating for leakage resiliency with application to Shannon security OTP and AES modes of operation. In:2017 International Conference on IoT and Application (ICIOT), pp 1–4. https://doi.org/10.1109/ICIOTA.2017.8073631
Medwed M, Standaert F, Großschädl J, Regazzoni F (2010) Fresh re-keying: security against side-channel and fault attacks for low-cost devices. In: Progress in cryptology - AFRICACRYPT 2010, pp 279–296. https://doi.org/10.1007/978-3-642-12678-9_17
Medwed M, Petit C, Regazzoni F, Renauld M, Standaert F (2011) Fresh re-keying II: securing multiple parties against side-channel and fault attacks. In: Smart card research and advanced applications, pp 115–132. https://doi.org/10.1007/978-3-642-27257-8_8
Xi X, Aysu A, Orshansky M (2018) Fresh re-keying with strong PUFs: a new approach to side-channel security. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp 118–125. https://doi.org/10.1109/hst.2018.8383899
Nikova S, Rechberger C, Rijmen V (2006) Threshold implementations against side-channel attacks and glitches. In: ICICS 2006: information and communications security, pp 69–83. https://doi.org/10.1007/11935308_38
Trusted Computing Group (2011) TPM structures. https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf. Accessed 27 February 2019
Gui Y, Siddiqui A S, Saqib F (2018) Hardware based root of trust for electronic control units, vol 2018, pp 1–7, https://doi.org/10.1109/SECON.2018.8479266
Siddiqui A S, Gui Y, Lawrence D, Laval S, Plusquellic J, Manjrekar M, Chowdhury B, Saqib F (2018) Hardware assisted security architecture for smart grid, vol 2018, pp 2890–2895, https://doi.org/10.1109/IECON.2018.8591401
Messerges TS, Dabbish EA, Sloan RH (1999) Investigations of power analysis attacks on smartcards. In: Proceedings of USENIX Workshop on Smartcard Technology, pp 151–161
Jin Y (2015) Introduction to hardware security, vol 4, pp 763–784, https://doi.org/10.3390/electronics4040763
Rosenfeld K, Karri R (2010) Attacks and defenses for JTAG, vol 27, pp 36–47, https://doi.org/10.1109/MDT.2010.9
Intel (2018) The TPM2 software stack: introducing a major open source release. https://software.intel.com/en-us/blogs/2018/08/29/tpm2-software-stack-open-source Accessed 04 October 2019
IBM (2019) IBM’s TPM 2.0 TSS. https://sourceforge.net/projects/ibmtpm20tss/ Accessed 04 Oct 2019
Satoh Laboratory (2014) SAKURA-X. http://satoh.cs.uec.ac.jp/SAKURA/hardware/SAKURA-X.html Accessed 11 March 2019
RF BAY INC (2006) LNA-1050. http://www.rfbayinc.com/upload/files/lna/lna-1050.pdf Accessed 11 March 2019
Tektronix (2013) DPO/DSA/MSO70000 Series Oscilloscopes. http://download.tek.com/document/55W-22447-9.pdf Accessed 11 March 2019
Keysight (formerly Agilent’s Electronic Measurement) (2007) E3612A 30W Power Supply, 60V, 0.5A or 120V, 0.25A. https://www.keysight.com/en/pd-838247-pn-E3612A Accessed 11 March 2019
Keysight (2018) N2862B Passive Probe, 10:1, 150 MHz, 1.2 m. https://www.keysight.com/en/pd-1938439-pn-N2862B/
ChipWhisperer Wiki (2018) CW505 Planar H-Field Probe. https://wiki.newae.com/CW50_Planar_H-Field_Probe Accessed 11 March 2019
Infineon (2017) IRIDIUM SLB 9670 TPM2.0 LINUX. https://www.infineon.com/cms/en/product/evaluation-boards/iridium9670-tpm2.0-linux Accessed 16 March 2019
Suciu A, Carean T (2010) Benchmarking the true random number generator of TPM chips. In: CoRR. arXiv:1008.2223 Accessed 10 April 2019
Xilinx (2018) Using encryption and authentication to secure an UltraScale/UltraScale+ FPGA Bitstream. https://www.xilinx.com/support/documentation/application_notes/xapp1267-encryp-efuse-program.pdf Accessed 09 October 2019
Trusted Computing Group (2013) Endorsement Key (EK) and Platform Certificate Enrollment Specification Frequently Asked Questions. https://trustedcomputinggroup.org/wp-content/uploads/IWG-EK-CMC-enrollment-for-TPM-v1-2-FAQ-rev-April-3-2013.pdf
Wang A, Wang C, Zheng X, Tian W, Xu R, Zhang G (2017) Random key rotation: side-channel countermeasure of NTRU cryptosystem for resource-limited devices. Computers & Electrical Engineering 63:220–231. https://doi.org/10.1016/j.compeleceng.2017.05.007
Kalyanaraman M, Orshansky M (2013) Novel strong PUF based on nonlinearity of MOSFET subthreshold operation. In: 2013 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp 18–23. https://doi.org/10.1109/HST.2013.6581558
Blömer J, Guajardo J, Krummel V (2004) Provably secure masking of AES. In: SAC 2004: selected areas in cryptography, pp 69–83. https://doi.org/10.1007/978-3-540-30564-4_5
Moradi A, Poschmann A, Ling S, Paar C, Wang H (2011) Pushing the limits: a very compact and a threshold implementation of AES. In: Advances in Cryptology - EUROCRYPT 2011, pp 69–89. https://doi.org/10.1007/978-3-642-20465-4_6
Infineon (2018) OPTIGATM TPM SLB 9670 TPM2.0 Data Sheet. https://www.infineon.com/dgdl/Infineon-data-sheet-SLB9670_2.0_Rev1.3-DS-v01_03-EN.pdf?fileId=5546d462689a790c016929ed3b5e4ffb Accessed 29 April 2019
Funding
This research has been sponsored by the National Science Foundation under Grant Nos. 1814420, 1819694, and 1819687.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gui, Y., Tamore, S.M., Siddiqui, A.S. et al. Key Update Countermeasure for Correlation-Based Side-Channel Attacks. J Hardw Syst Secur 4, 167–179 (2020). https://doi.org/10.1007/s41635-020-00094-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-020-00094-x