DocumentCode :
3313589
Title :
Pre-processing power traces to defeat random clocking countermeasures
Author :
Hodgers, Philip ; Hanley, Neil ; O´Neill, Maire
Author_Institution :
Centre for Secure Inf. Technol. (CSIT), Queen´s Univ. Belfast, Belfast, UK
fYear :
2015
fDate :
24-27 May 2015
Firstpage :
85
Lastpage :
88
Abstract :
We describe a pre-processing correlation attack on an FPGA implementation of AES, protected with a random clocking countermeasure that exhibits complex variations in both the location and amplitude of the power consumption patterns of the AES rounds. It is demonstrated that the merged round patterns can be pre-processed to identify and extract the individual round amplitudes, enabling a successful power analysis attack. We show that the requirement of the random clocking countermeasure to provide a varying execution time between processing rounds can be exploited to select a sub-set of data where sufficient current decay has occurred, further improving the attack. In comparison with the countermeasure´s estimated security of 3 million traces from an integration attack, we show that through application of our proposed techniques that the countermeasure can now be broken with as few as 13k traces.
Keywords :
cryptography; field programmable gate arrays; AES; FPGA implementation; data subset selection; power analysis attack; power consumption pattern amplitude; power consumption pattern location; preprocessing correlation attack; preprocessing power traces; random clocking countermeasures; round amplitude extraction; round amplitude identification; varying execution time; Clocks; Computer science; Correlation; Cryptography; Hardware; Power demand; Smart cards; FPGA; power analysis attacks; random clocking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems (ISCAS), 2015 IEEE International Symposium on
Conference_Location :
Lisbon
Type :
conf
DOI :
10.1109/ISCAS.2015.7168576
Filename :
7168576
Link To Document :
بازگشت