Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure

03/16/2020
by   Archisman Ghosh, et al.
0

Mathematically-secure cryptographic algorithms leak significant side channel information through their power supplies when implemented on a physical platform. These side channel leakages can be exploited by an attacker to extract the secret key of an embedded device. The existing state-of-the-art countermeasures mainly focus on the power balancing, gate-level masking, or signal-to-noise (SNR) reduction using noise injection and signature attenuation, all of which suffer either from the limitations of high power/area overheads, performance degradation or are not synthesizable. In this article, we propose a generic low-overhead digital-friendly power SCA countermeasure utilizing physical Time-Varying Transfer Functions (TVTF) by randomly shuffling distributed switched capacitors to significantly obfuscate the traces in the time domain. System-level simulation results of the TVTF-AES implemented in TSMC 65nm CMOS technology show > 4000x MTD improvement over the unprotected implementation with nearly 1.25x power and 1.2x area overheads, and without any performance degradation.

READ FULL TEXT

page 1

page 5

page 7

page 8

page 9

page 10

research
12/04/2021

Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments

The physical-layer secret key generation has emerged as a promising solu...
research
08/19/2022

An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks

Side-channel attacks (SCAs), which infer secret information (for example...
research
08/22/2019

Optimal step-size of least mean absolute fourth algorithm in low SNR

There is a need to improve the capability of the adaptive filtering algo...
research
06/25/2021

Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack

Side-channel and fault injection attacks reveal secret information by mo...
research
04/04/2023

Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code

Although cryptographic algorithms may be mathematically secure, it is of...
research
06/04/2020

Design and Hardware Implementation of a Separable Image Steganographic Scheme Using Public-key Cryptosystem

In this paper, a novel and efficient hardware implementation of steganog...

Please sign up or login with your details

Forgot password? Click here to reset