Title :
Power Profile Obfuscation Using Nanoscale Memristive Devices to Counter DPA Attacks
Author :
Khedkar, Ganesh ; Kudithipudi, Dhireesha ; Rose, Garrett S.
Author_Institution :
Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA
Abstract :
Side channel attacks (SCAs), such as differential power analysis (DPA), are considered as one of the most competent attacks to obtain the secure key of a cryptographic algorithm. Conventional countermeasures for DPAs are focused on hiding and masking techniques at different levels of design abstraction, associated with high power or area cost. However, emerging technologies such as resistive random access memory (RRAM), offer unique opportunities to mitigate SCAs/DPAs with their inherent device characteristics such as variability in write time, ultra low power (0.1-3 pJ/bit), and high density (4F 2). In this research, DPA attacks are mitigated by obfuscating the power profile using inverse RRAM modules. The state memory transaction power traces are balanced when the inverse memory is accessed in tandem with the memory module based on a peripheral balancing logic block. A baseline RTL architecture for the 128-bit AES cryptoprocessor is designed and implemented in CMOS technology. Balancing using RRAM and CMOS memory modules is compared against this baseline architecture. A customized simulation framework is developed for extracting the power traces using Synopsys and Cadence tool suites along with a Hamming weight DPA attack module implemented in Python. The attack mounted on the baseline architectures was successful and the full key was recovered. However, DPA attacks mounted on the inverse CMOS and RRAM-based AES cryptoprocessor yielded unsuccessful results with no keys recovered, demonstrating the resiliency of the proposed architecture against DPA attacks. More importantly, the power consumed with the RRAM balancing logic block is one order lower than the corresponding pure CMOS implementation.
Keywords :
CMOS integrated circuits; cryptography; power aware computing; random-access storage; AES cryptoprocessor; CMOS memory modules; CMOS technology; Cadence tool; Hamming weight DPA attack module; RRAM; SCA; Synopsys; counter DPA attacks; cryptographic algorithm; customized simulation framework; design abstraction; differential power analysis; hiding techniques; inverse RRAM modules; inverse memory; masking techniques; memory module; nanoscale memristive devices; peripheral balancing logic block; power profile obfuscation; resistive random access memory; side channel attacks; state memory transaction power; CMOS integrated circuits; Encryption; Memristors; Metals; Semiconductor device modeling; Switches; Differential Power Attacks (DPA); Differential power attacks (DPA); Memristor; RRAM; Side Channel Attacks (SCA); memristor; resistive random access memory (RRAM); side channel attacks (SCA);
Journal_Title :
Nanotechnology, IEEE Transactions on
DOI :
10.1109/TNANO.2014.2362416