Title :
Masking the energy behaviour of encryption algorithms
Author :
Saputra, H. ; Vijaykrishnan, N. ; Kandemir, M. ; Irwin, M.J. ; Brooks, R.
Abstract :
Smart cards are vulnerable to both noninvasive attacks using power and timing measurements to extract the cryptographic key. The power measurement techniques rely on the data-dependent energy behaviour of the underlying system. Further, power analysis can be used to identify the specific portions of the program being executed to induce timing glitches that may in turn help to bypass key checking. Thus, it is important to mask the energy consumption when executing the encryption algorithms. The instruction set architecture of a simple five-stage pipelined smart card processor with secure instructions to mask the energy differences due to key-related data-dependent computations in DES and Rijndael encryptions is augmented. The secure versions operate on the normal and complementary versions of the operands simultaneously to mask the energy variations due to value-dependent operations. However, this incurs the penalty of increased overall energy consumption in the data-path components. Consequently, we employ secure versions of instructions only for critical operations; that is we use secure instructions selectively, as directed by an optimising compiler. Using a cycle-accurate energy simulator, the effectiveness of this enhancement is demonstrated. The approach achieves energy masking of critical operations, consuming 83% less energy compared to existing approaches employing dual rail circuits
Keywords :
computer crime <encryption algms., masking energy behaviour>; cryptography <encryption algms., masking energy behaviour>; optimising compilers <encryption algms., masking energy behaviour>; pipeline processing <encryption algms., masking energy behaviour>; smart cards <encryption algms., masking energy behaviour>; DES encryptions; Rijndael encryptions; bypass key checking; cryptographic key extraction; cycle-accurate energy simulator; data-dependent energy behaviour; data-path components; dual rail circuits; encryption algorithm energy behaviour; five-stage pipelined smart card processor; keyrelated data-dependent computations; noninvasive attacks; optimising compiler; power measurement techniques; power measurements; smart cards; timing glitches; timing measurements;
Journal_Title :
Computers and Digital Techniques, IEE Proceedings -
DOI :
10.1049/ip-cdt:20030832