ABSTRACT
Electromagnetic (EM) analysis is to reveal the secret information by analyzing the EM emission from a cryptographic device. EM analysis (EMA) attack is emerging as a serious threat to hardware security. It has been noted that the on-chip power grid (PG) has a security implication on EMA attack by affecting the fluctuations of supply current. However, there is little study on exploiting this intrinsic property as an active countermeasure against EMA. In this paper, we investigate the effect of PG on EM emission and propose an active countermeasure against EMA, i.e. EM Equalizer (EME). By adjusting the PG impedance, the current waveform can be flattened, equalizing the EM profile. Therefore, the correlation between secret data and EM emission is significantly reduced. As a first attempt to the co-optimization for power and EM security, we extend the EME method by fixing the vulnerability of power analysis. To verify the EME method, several cryptographic designs are implemented. The measurement to disclose (MTD) is improved by 1138x with area and power overheads of 0.62% and 1.36%, respectively.
- [1]. . 2008. Handbook of Algorithms for Physical Design Automation. CRC Press.Google ScholarCross Ref
- [2].ANSYS HFSS 2018. https://www.ansys.com/products/electronics/ansys-hfssGoogle Scholar
- [3]. . 2004. Correlation Power Analysis with a Leakage Model. In Cryptographic Hardware and Embedded Systems, CHES. 16–29.Google Scholar
- [4]. . 2017. Impact of Power Distribution Network on Power Analysis Attacks in Three-Dimensional Integrated Circuits. In Proceedings of the on Great Lakes Symposium on VLSI, GLVLSI. 327–332.Google Scholar
- [5]. . 2016. Accurate verification of RC power grids. In Design, Automation & Test in Europe Conference & Exhibition, DATE. 814–817.Google Scholar
- [6]. . 2015. A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation. IEEE Trans. on CAD of Integrated Circuits and Systems 34, 8 (2015), 1308–1319.Google ScholarDigital Library
- [7]. . 2015. Implementing GCM on ARMv8. In Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. 167–180.Google Scholar
- [8]. . 2012. An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation. In Constructive Side-Channel Analysis and Secure Design, COSADE. 39–53.Google Scholar
- [9]. . 2018. Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator. CoRR abs/1802.09096 (2018).Google Scholar
- [10]. . 2017. 8.1 Improved power-side-channel-attack resistance of an AES-128 core via a security-aware integrated buck voltage regulator. In IEEE International Solid-State Circuits Conference, ISSCC. 142–143.Google Scholar
- [11]. . 2017. Implications of Distributed On-Chip Power Delivery on EM Side-Channel Attacks. In IEEE International Conference on Computer Design, ICCD. 329–336.Google Scholar
- [12]. . 1999. Differential Power Analysis. In Advances in Cryptology - CRYPTO. 388–397.Google Scholar
- [13]. . 2005. Security Evaluation Against Electromagnetic Analysis at Design Time. In Cryptographic Hardware and Embedded Systems, CHES. 280–292.Google Scholar
- [14]. . 2015. SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. In Cryptographic Hardware and Embedded Systems - CHES 2015 — 17th International Workshop, Saint-Malo, France, September 13–16, 2015, Proceedings. 620–640.Google Scholar
- [15]. . 2013. An evaluation of an AES implementation protected against EM analysis. In Great Lakes Symposium on VLSI, GLSVLSI. 317–318.Google Scholar
- [16]. . 2008. Power analysis attacks: Revealing the secrets of smart cards. Springer.Google Scholar
- [17]. . 2015. EM attack sensor: concept, circuit, and design-automation methodology. In The 52nd Design Automation Conference, DAC. 176:1–176:6.Google Scholar
- [18]. . 2014. Side-channel attack resistant AES cryptographic circuits with ROM reducing address-dependent EM leaks. In IEEE International Symposium on Circuits and Systemss, ISCAS. 2547–2550.Google Scholar
- [19]. . 2010. Spatial EM jamming: A countermeasure against EM Analysis?. In 18th IEEE/IFIP VLSI-SoC 2010, IEEE/IFIP WG 10.5 International Conference on Very Large Scale Integration of System-on-Chip. 105–110.Google Scholar
- [20]. . 2005. Power grid analysis using random walks. IEEE Trans. on CAD of Integrated Circuits and Systems 24, 8 (2005), 1204–1224.Google Scholar
- [21]. . 2001. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart, Proceedings. 200–210.Google Scholar
- [22]. . 2009. Low power design essentials. Springer Science & Business Media.Google ScholarCross Ref
- [23]. . 2014. A Primer on Hardware Security: Models, Methods, and Metrics. Proc. IEEE 102, 8 (2014), 1283–1295.Google ScholarCross Ref
- [24]. . 2006. An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays. Proc. IEEE 94, 2 (2006), 383–394.Google ScholarCross Ref
- [25]. . 2014. On measurable side-channel leaks inside ASIC design primitives. J. Cryptographic Engineering 4, 1 (2014), 59–73.Google Scholar
- [26]. . 2010. Securing Encryption Systems With a Switched Capacitor Current Equalizer. J. Solid-State Circuits 45, 1 (2010), 23–31.Google ScholarCross Ref
- [27]. . 2017. Power Profile Equalizer: A Lightweight Countermeasure against Side-Channel Attack. In IEEE International Conference on Computer Design, ICCD. 305–312.Google Scholar
- [28]. . 2013. Role of power grid in side channel attack and power-grid-aware secure design. In The 50th Annual Design Automation Conference, DAC. 78:1–78:9.Google Scholar
- [29]. . 2015. Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks. In The 52nd Annual Design Automation Conference, DAC. 115:1–115:6.Google Scholar
- [30]. . 2014. Experimental Demonstration of Electromagnetic Information Leakage From Modern Processor-Memory Systems. IEEE Trans. on Electromagnetic Compatibility 56, 4 (2014), 885–893.Google ScholarCross Ref
Index Terms
- Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
Recommendations
Efficient simulation of EM side-channel attack resilience
ICCAD '17: Proceedings of the 36th International Conference on Computer-Aided DesignElectromagnetic (EM) fields emanated during crypto-operations are an effective non-invasive channel for extracting secret keys. To predict vulnerabilities and improve resilience to EM side-channel analysis attacks, design-time simulation tools are ...
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks
AINAW '07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01Denial-of-Service (DoS) attacks are serious threats due to the resources constrained property in wireless sensor networks. Jamming attacks are the representative energy-consumption DoS attacks that can be launched easily. Hence, many countermeasures ...
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
ACISP '02: Proceedings of the 7th Australian Conference on Information Security and PrivacyWe show that a randomized addition-subtraction chains countermeasure against side channel attacks is vulnerable to SPA attack, a kind of side channel attack, under distinguishability between addition and doubling. A side channel attackis an attackthat ...
Comments