• DocumentCode
    1778626
  • Title

    Towards a framework to perform DPA attack on GALS pipeline architectures

  • Author

    Loder, Luciano ; de Souza, Adao ; Fay, Marcelo ; Soares, Rafael

  • Author_Institution
    Inst. Fed. Sul-Riograndense - IFSUL, Pelotas, Brazil
  • fYear
    2014
  • fDate
    1-5 Sept. 2014
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Differential power analysis (DPA) is a low cost method to extract secret information from supposedly secure cryptographic systems. DPA correlates the data processed with power consumption of the device through statistical analyses to unveil the secret key of the system. A common approach to counteract DPA is randomizing the data processing in order to misalign power consumption traces in time and amplitude domains using strategies such as random delay insertion and random clock frequency. The combination of strategies requires more computational effort for a successful DPA attack. This paper introduces the first steps toward a framework to compromise cryptographic systems that combine misalignment strategies to hide leakage information. The steps of the proposed framework are discussed in terms of computational efforts and successful attacks rate. The results obtained in an architecture prototyped on FPGA show that noise filtering can significantly improve the DPA success rate. Furthermore, clustering traces by frequency allow the improvement of the alignment step, thus increasing about 40 times the efficiency of the DPA attack to the cost of an increase of the computational efforts.
  • Keywords
    cryptography; power consumption; statistical analysis; time-domain analysis; DPA attack; GALS pipeline architectures; amplitude domain; clustering traces; computational efforts; data processing; differential power analysis; extract secret information; leakage information; noise filtering; power consumption; random clock frequency; random delay insertion; secure cryptographic systems; statistical analysis; time domain; Clocks; Correlation; Cryptography; Noise; Pipelines; Power demand; Synchronization; CEMA; CPA; Criptography; DPA; FFT; security; side-channel attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Integrated Circuits and Systems Design (SBCCI), 2014 27th Symposium on
  • Conference_Location
    Aracaju
  • Type

    conf

  • DOI
    10.1145/2660540.2661001
  • Filename
    6994653