skip to main content
10.1145/2589650.2559628acmotherconferencesArticle/Chapter ViewAbstractPublication Pageses4cpsConference Proceedingsconference-collections
research-article

Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology

Published: 11 November 2013 Publication History

Abstract

Cyber-Physical Systems (CPS) are often deployed in critical domains like health, traffic management etc. Therefore security is one of the major driving factor in development of CPS. In this paper, we focus on cryptographic hardware embedded in CPS and propose a simulation methodology to evaluate the security of these cryptographic hardware cores. Designers are often concerned about attacks like Side-Channel Analysis (SCA) which target the physical implementation of cryptography to compromise its security. SCA considers the physical "leakage" of a well chosen intermediate variable correlated with the secret. Certain countermeasures can be deployed, like dual-rail logic or masking, to resist SCA. However to design an effective countermeasure or to fix the vulnerable sources in a circuit, it is of prime importance for a designer to know the main leaking sources in the device. In practice, security of a circuit is evaluated only after the chip is fabricated followed by a certification process. If the circuit has security concerns, it should pass through all the design phases right from RTL to fabrication which increases time-to-market. In such a scenario, it is very helpful if a designer can determine the vulnerabilities early in the design cycle and fix them. In this paper, we present an evaluation of different strategies to verify the SCA robustness of a cryptographic circuit at different design steps, from the RTL to the final layout. We compare evaluation based on digital and electrical simulations in terms of speed and accuracy in a side-channel context. We show that a low-level digital simulation can be fast and sufficiently accurate for side-channel analysis.

References

[1]
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In CRYPTO, volume 1666 of LNCS, pages pp 388--397. Springer, 1999.
[2]
Éric Brier, Christophe Clavier, and Francis Olivier. Correlation Power Analysis with a Leakage Model. In CHES, volume 3156 of LNCS, pages 16--29. Springer, August 11--13 2004. Cambridge, MA, USA.
[3]
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and Charlotte Vikkelsoe. PRESENT: An Ultra-Lightweight Block Cipher. In CHES, volume 4727 of LNCS, pages 450--466. Springer, September 10-13 2007. Vienna, Austria.
[4]
François-Xavier Standaert, Tal Malkin, and Moti Yung. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In EUROCRYPT, volume 5479 of LNCS, pages 443--461. Springer, April 26-30 2009. Cologne, Germany.
[5]
Jerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, and W. Wiersma. Pinpas: A tool for power analysis of smartcards. In Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, and Sokratis K. Katsikas, editors, SEC, volume 250 of IFIP Conference Proceedings, pages 453--457. Kluwer, 2003.
[6]
Manfred Josef Aigner, Stefan Mangard, Francesco Menichelli, Renato Menicocci, Mauro Olivieri, Thomas Popp, Giuseppe Scotti, and Alessandro Trifiletti. Side channel analysis resistant design flow. In ISCAS. IEEE, 2006.
[7]
Luca Benini, Davide Bertozzi, Alessandro Bogliolo, Francesco Menichelli, and Mauro Olivieri. Mparm: Exploring the multi-processor soc design space with systemc. VLSI Signal Processing, 41(2):169--182, 2005.
[8]
Amir Moradi. Statistical tools flavor side-channel collision attacks. In David Pointcheval and Thomas Johansson, editors, EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, pages 428--445. Springer, 2012.
[9]
Stefan Mangard, Norbert Pramstaller, and Elisabeth Oswald. Successfully Attacking Masked AES Hardware Implementations. In LNCS, editor, Proceedings of CHES'05, volume 3659 of LNCS, pages 157--171. Springer, August 29 -- September 1 2005. Edinburgh, Scotland, UK.
[10]
Kris Tiri and Ingrid Verbauwhede. A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In DATE'04, pages 246--251. IEEE Computer Society, February 2004. Paris, France.
[11]
Shivam Bhasin, Sylvain Guilley, Florent Flament, Nidhal Selmane, and Jean-Luc Danger. Countering Early Evaluation: An Approach Towards Robust Dual-Rail Precharge Logic. In WESS, pages 6:1--6:8. ACM, October 24-28 2010. Scottsdale, Arizona, USA.

Cited By

View all
  • (2024)Secure Physical DesignHardware Security10.1007/978-3-031-58687-3_9(401-445)Online publication date: 3-Apr-2024
  • (2023)On the Unpredictability of SPICE Simulations for Side-Channel Leakage Verification of Masked Cryptographic Circuits2023 60th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC56929.2023.10247834(1-6)Online publication date: 9-Jul-2023
  • (2023)CAD for Power Side-Channel DetectionCAD for Hardware Security10.1007/978-3-031-26896-0_6(123-147)Online publication date: 28-Jan-2023

Index Terms

  1. Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ES4CPS '14: Proceedings of International Workshop on Engineering Simulations for Cyber-Physical Systems
      March 2014
      44 pages
      ISBN:9781450326148
      DOI:10.1145/2589650
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • Technische Universität Ilmenau: Technische Universität Ilmenau

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 November 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Design-Time security Evaluation
      2. Side-Channel Analysis

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ES4CPS '14

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Secure Physical DesignHardware Security10.1007/978-3-031-58687-3_9(401-445)Online publication date: 3-Apr-2024
      • (2023)On the Unpredictability of SPICE Simulations for Side-Channel Leakage Verification of Masked Cryptographic Circuits2023 60th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC56929.2023.10247834(1-6)Online publication date: 9-Jul-2023
      • (2023)CAD for Power Side-Channel DetectionCAD for Hardware Security10.1007/978-3-031-26896-0_6(123-147)Online publication date: 28-Jan-2023

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media