DocumentCode :
1776976
Title :
Experiments on two clock countermeasures against power analysis attacks
Author :
Menicocci, Renato ; Trifiletti, Alessandro ; Trotta, Francesco
Author_Institution :
Fondazione Ugo Bordoni, Rome, Italy
fYear :
2014
fDate :
19-21 June 2014
Firstpage :
215
Lastpage :
219
Abstract :
Two countermeasures against DPA/CPA attacks have been designed, tested and compared on an AES encoding coprocessor implemented on FPGA. Both countermeasures are based on altering the clock signal and can be readily implemented at RTL design stage. Experimental results based on first order CPA attacks confirmed the effectiveness of both the countermeasures in protecting the SBOX output, showing that even with the acquisition of 300000 power curves, the encryption key can´t be revealed by the relevant correlation peaks.
Keywords :
clocks; coprocessors; cryptography; encoding; field programmable gate arrays; logic design; logic testing; AES encoding coprocessor; FPGA; RTL design stage; SBOX output; clock countermeasure; correlation power analysis attack; differential power analysis attack; encryption key; first order DPA-CPA attack; power curve acquisition; Clocks; Correlation; Cryptography; Encoding; Field programmable gate arrays; Power demand; AES; CPA; Clock random skewing; Clock randomization; DPA; FPGA; RTL countermeasure; Side Channel Attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mixed Design of Integrated Circuits & Systems (MIXDES), 2014 Proceedings of the 21st International Conference
Conference_Location :
Lublin
Print_ISBN :
978-83-63578-03-9
Type :
conf
DOI :
10.1109/MIXDES.2014.6872188
Filename :
6872188
Link To Document :
بازگشت