Equivalent current source of side-channel signal for countermeasure design with analog circuit simulator

T. Amano, K. Iokibe, Y. Toyota
{"title":"Equivalent current source of side-channel signal for countermeasure design with analog circuit simulator","authors":"T. Amano, K. Iokibe, Y. Toyota","doi":"10.1109/ISEMC.2012.6351661","DOIUrl":null,"url":null,"abstract":"Side-channel attack is a cryptanalytic attack based on information gained from the physical implementation of a cryptographic IC. The simultaneous switching noise (SSN) current is generated as logic gates in cryptographic IC switch simultaneously in encryption processes. SSN current is a cause of electromagnetic interference (EMI). In this study, linear equivalent circuit modeling was examined for the sake of a developing method to evaluate cryptographic systems before fabrication. A linear equivalent circuit model of a cryptographic FPGA, in which an AES algorithm had been implemented, was determined from experimental measurements. The model was implemented into a commercial analog circuit simulator, and the SSN current was estimated under three configurations among which a decoupling circuit, used as a countermeasure, was changed. Estimated current traces were analyzed statistically by using the correlation power analysis (CPA) method to obtain correlation values, a major index security against side-channel attacks. Variation of the correlation values with a decoupling configuration agreed with the corresponding experimental results also obtained in this study. This means that the security of cryptographic devices against side-channel attacks based on analysis of the SSN current can be estimated by using the equivalent circuit model before fabrication.","PeriodicalId":197346,"journal":{"name":"2012 IEEE International Symposium on Electromagnetic Compatibility","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Symposium on Electromagnetic Compatibility","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEMC.2012.6351661","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Side-channel attack is a cryptanalytic attack based on information gained from the physical implementation of a cryptographic IC. The simultaneous switching noise (SSN) current is generated as logic gates in cryptographic IC switch simultaneously in encryption processes. SSN current is a cause of electromagnetic interference (EMI). In this study, linear equivalent circuit modeling was examined for the sake of a developing method to evaluate cryptographic systems before fabrication. A linear equivalent circuit model of a cryptographic FPGA, in which an AES algorithm had been implemented, was determined from experimental measurements. The model was implemented into a commercial analog circuit simulator, and the SSN current was estimated under three configurations among which a decoupling circuit, used as a countermeasure, was changed. Estimated current traces were analyzed statistically by using the correlation power analysis (CPA) method to obtain correlation values, a major index security against side-channel attacks. Variation of the correlation values with a decoupling configuration agreed with the corresponding experimental results also obtained in this study. This means that the security of cryptographic devices against side-channel attacks based on analysis of the SSN current can be estimated by using the equivalent circuit model before fabrication.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用模拟电路模拟器进行对抗设计的边道信号等效电流源
侧信道攻击是一种基于从加密IC的物理实现中获取信息的密码分析攻击,在加密过程中,同步开关噪声(SSN)电流作为逻辑门同时在加密IC的开关中产生。SSN电流是电磁干扰(EMI)的一个原因。在这项研究中,线性等效电路建模的目的是为了开发一种方法来评估在制造之前的密码系统。通过实验测量,确定了一种加密FPGA的线性等效电路模型,其中实现了AES算法。在商业模拟电路模拟器中实现了该模型,并在三种配置下估计了SSN电流,其中改变了去耦电路作为对抗电路。利用相关功率分析(CPA)方法对估计的电流迹线进行统计分析,获得相关值,这是防止侧信道攻击的主要指标。相关值随解耦组态的变化也与实验结果一致。这意味着基于SSN电流分析的加密设备的安全性可以通过在制造前使用等效电路模型来估计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Optimal placement for partially populated system EMI testing Overview of the threat of IEMI (intentional electromagnetic interference) Emission source for compatibility testing of wireless networks in the below-deck environment on ships Evaluation of dielectric permittivity for homogeneous materials from transmittance requirements On-chip magnetic resonant coupling with multi-stacked inductive coils for chip-to-chip wireless power transfer (WPT)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1