Skip to main content

2021 | OriginalPaper | Buchkapitel

7. CAD for Side-Channel Leakage Assessment

verfasst von : Adib Nahiyan, Miao (Tony) He, Jungmin Park, Mark Tehranipoor

Erschienen in: Emerging Topics in Hardware Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Power side-channel attacks (SCAs) have been proven to be effective at extracting secret keys from hardware implementations of cryptographic algorithms. Therefore, it is imperative to evaluate if the hardware is vulnerable to SCAs during its design and validation stages. Ideally, this validation should be performed as early as the pre-silicon stage. In this chapter, we present some existing techniques for PSCL assessment and discuss in depth on two CAD frameworks called SCRIPT and RTL-PSC which evaluates information leakage through side-channel analysis at pre-silicon stage.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Stuck-at-fault is modeled by assigning a fixed logic value (0 or 1) to a single net or port of a design [34].
 
2
This seed is the same as TVLA’s setup [43] and 1000 plaintexts are enough to estimate SCA leakage based on our experiments.
 
3
The SRem represents the empirical SR based on actual SCA attacks with n plaintexts.
 
Literatur
1.
Zurück zum Zitat P.C. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’99, London, UK, 1999 (Springer, Berlin, 1999), pp. 388–397 P.C. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’99, London, UK, 1999 (Springer, Berlin, 1999), pp. 388–397
2.
Zurück zum Zitat P.C. Kocher, Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems, in Advances in Cryptology—CRYPTO ’96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18–22, 1996, Proceedings (1996), pp. 104–113 P.C. Kocher, Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems, in Advances in Cryptology—CRYPTO ’96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18–22, 1996, Proceedings (1996), pp. 104–113
3.
Zurück zum Zitat P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Annual International Cryptology Conference (Springer, Berlin, 1999), pp. 388–397MATH P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Annual International Cryptology Conference (Springer, Berlin, 1999), pp. 388–397MATH
4.
Zurück zum Zitat E. Brier, C. Clavier, F. Olivier, Correlation power analysis with a leakage model, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2004), pp. 16–29 E. Brier, C. Clavier, F. Olivier, Correlation power analysis with a leakage model, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2004), pp. 16–29
5.
Zurück zum Zitat B. Gierlichs, L. Batina, P. Tuyls, B. Preneel, Mutual information analysis, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2008), pp. 426–442 B. Gierlichs, L. Batina, P. Tuyls, B. Preneel, Mutual information analysis, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2008), pp. 426–442
6.
Zurück zum Zitat T.-H. Le, J. Clédière, C. Canovas, B. Robisson, C. Servière, J.-L. Lacoume, A proposition for correlation power analysis enhancement, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2006), pp. 174–186 T.-H. Le, J. Clédière, C. Canovas, B. Robisson, C. Servière, J.-L. Lacoume, A proposition for correlation power analysis enhancement, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2006), pp. 174–186
7.
Zurück zum Zitat Y. Fei, A. Adam Ding, J. Lao, L. Zhang, A statistics-based fundamental model for side-channel attack analysis. IACR Cryptol. ePrint Arch. 2014, 152 (2014) Y. Fei, A. Adam Ding, J. Lao, L. Zhang, A statistics-based fundamental model for side-channel attack analysis. IACR Cryptol. ePrint Arch. 2014, 152 (2014)
8.
Zurück zum Zitat A. Moradi, Masking as a side-channel countermeasure in hardware. ISCISC 2016 Tutorial (2006) A. Moradi, Masking as a side-channel countermeasure in hardware. ISCISC 2016 Tutorial (2006)
9.
Zurück zum Zitat G. Barthe, S. Belaïd, F. Dupressoir, P.-A. Fouque, B. Grégoire, P.-Y. Strub, Verified proofs of higher-order masking, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, 2015), pp. 457–485MATH G. Barthe, S. Belaïd, F. Dupressoir, P.-A. Fouque, B. Grégoire, P.-Y. Strub, Verified proofs of higher-order masking, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, 2015), pp. 457–485MATH
10.
Zurück zum Zitat R. Bloem, H. Gross, R. Iusupov, B. Könighofer, S. Mangard, J. Winter, Formal verification of masked hardware implementations in the presence of glitches, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, 2018), pp. 321–353MATH R. Bloem, H. Gross, R. Iusupov, B. Könighofer, S. Mangard, J. Winter, Formal verification of masked hardware implementations in the presence of glitches, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, 2018), pp. 321–353MATH
11.
Zurück zum Zitat T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)MathSciNetMATHCrossRef T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)MathSciNetMATHCrossRef
12.
Zurück zum Zitat S. Mangard, Hardware countermeasures against DPA—a statistical analysis of their effectiveness, in Cryptographers’ Track at the RSA Conference (Springer, Berlin 2004), pp. 222–235MATH S. Mangard, Hardware countermeasures against DPA—a statistical analysis of their effectiveness, in Cryptographers’ Track at the RSA Conference (Springer, Berlin 2004), pp. 222–235MATH
13.
Zurück zum Zitat B.J. Gilbert Goodwill, J. Jaffe, P. Rohatgi, et al., A testing methodology for side-channel resistance validation, in NIST Non-Invasive Attack Testing Workshop (2011) B.J. Gilbert Goodwill, J. Jaffe, P. Rohatgi, et al., A testing methodology for side-channel resistance validation, in NIST Non-Invasive Attack Testing Workshop (2011)
14.
Zurück zum Zitat F. Durvaux, F.-X. Standaert, From improved leakage detection to the detection of points of interests in leakage traces, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, 2016), pp. 240–262MATH F. Durvaux, F.-X. Standaert, From improved leakage detection to the detection of points of interests in leakage traces, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, 2016), pp. 240–262MATH
15.
Zurück zum Zitat B. Gierlichs, K. Lemke-Rust, C. Paar, Templates vs. stochastic methods, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2006), pp. 15–29 B. Gierlichs, K. Lemke-Rust, C. Paar, Templates vs. stochastic methods, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2006), pp. 15–29
16.
Zurück zum Zitat N. Veyrat-Charvillon, F.-X. Standaert, Mutual information analysis: how, when and why? in Cryptographic Hardware and Embedded Systems-CHES 2009 (Springer, Berlin, 2009), pp. 429–443 N. Veyrat-Charvillon, F.-X. Standaert, Mutual information analysis: how, when and why? in Cryptographic Hardware and Embedded Systems-CHES 2009 (Springer, Berlin, 2009), pp. 429–443
17.
Zurück zum Zitat S.A. Huss, M. Stöttinger, M. Zohner, Amasive: an adaptable and modular autonomous side-channel vulnerability evaluation framework, in Number Theory and Cryptography (Springer, Berlin, 2013), pp. 151–165MATH S.A. Huss, M. Stöttinger, M. Zohner, Amasive: an adaptable and modular autonomous side-channel vulnerability evaluation framework, in Number Theory and Cryptography (Springer, Berlin, 2013), pp. 151–165MATH
18.
Zurück zum Zitat A. Nahiyan, J. Park, M. He, Y. Iskander, F. Farahmandi, D. Forte, M. Tehranipoor, SCRIPT: a CAD framework for power side-channel vulnerability assessment using information flow tracking and pattern generation. ACM Trans. Des. Autom. Electron. Syst. 25(3), 1–27 (2020)CrossRef A. Nahiyan, J. Park, M. He, Y. Iskander, F. Farahmandi, D. Forte, M. Tehranipoor, SCRIPT: a CAD framework for power side-channel vulnerability assessment using information flow tracking and pattern generation. ACM Trans. Des. Autom. Electron. Syst. 25(3), 1–27 (2020)CrossRef
19.
Zurück zum Zitat M.T. He, J. Park, A. Nahiyan, A. Vassilev, Y. Jin, M. Tehranipoor. RTL-PSC: automated power side-channel leakage assessment at register-transfer level, in 2019 IEEE 37th VLSI Test Symposium (VTS) (IEEE, Piscataway, 2019), pp. 1–6 M.T. He, J. Park, A. Nahiyan, A. Vassilev, Y. Jin, M. Tehranipoor. RTL-PSC: automated power side-channel leakage assessment at register-transfer level, in 2019 IEEE 37th VLSI Test Symposium (VTS) (IEEE, Piscataway, 2019), pp. 1–6
20.
Zurück zum Zitat A. Moradi, B. Richter, T. Schneider, F.-X. Standaert, Leakage detection with the x2-test. IACR Trans. Cryptogr. Hardware Embed. Syst. 2018(1), 209–237 (2018)CrossRef A. Moradi, B. Richter, T. Schneider, F.-X. Standaert, Leakage detection with the x2-test. IACR Trans. Cryptogr. Hardware Embed. Syst. 2018(1), 209–237 (2018)CrossRef
21.
Zurück zum Zitat N. Veshchikov, S. Guilley, Use of simulators for side-channel analysis, in 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (IEEE, Piscataway, 2017), pp. 104–112 N. Veshchikov, S. Guilley, Use of simulators for side-channel analysis, in 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (IEEE, Piscataway, 2017), pp. 104–112
22.
Zurück zum Zitat J. den Hartog, J. Verschuren, E. de Vink, J. de Vos, W. Wiersma, Pinpas: a tool for power analysis of smartcards, in IFIP International Information Security Conference (Springer, Berlin, 2003), pp. 453–457 J. den Hartog, J. Verschuren, E. de Vink, J. de Vos, W. Wiersma, Pinpas: a tool for power analysis of smartcards, in IFIP International Information Security Conference (Springer, Berlin, 2003), pp. 453–457
23.
Zurück zum Zitat M. Aigner, S. Mangard, F. Menichelli, R. Menicocci, M. Olivieri, T. Popp, G. Scotti, A. Trifiletti, Side channel analysis resistant design flow, in Circuits and Systems, 2006. ISCAS 2006. Proceedings. 2006 IEEE International Symposium on (IEEE, Piscataway, 2006), p. 4 M. Aigner, S. Mangard, F. Menichelli, R. Menicocci, M. Olivieri, T. Popp, G. Scotti, A. Trifiletti, Side channel analysis resistant design flow, in Circuits and Systems, 2006. ISCAS 2006. Proceedings. 2006 IEEE International Symposium on (IEEE, Piscataway, 2006), p. 4
24.
Zurück zum Zitat Y.A. Durrani, T. Riesgo, Power estimation for intellectual property-based digital systems at the architectural level. J. King Saud Univ. Comput. Inf. Sci. 26(3), 287–295 (2014) Y.A. Durrani, T. Riesgo, Power estimation for intellectual property-based digital systems at the architectural level. J. King Saud Univ. Comput. Inf. Sci. 26(3), 287–295 (2014)
25.
Zurück zum Zitat C. Thuillet, P. Andouard, O. Ly, A smart card power analysis simulator, in International Conference on Computational Science and Engineering, 2009. CSE’09, vol. 2 (IEEE, Piscataway, 2009), pp. 847–852 C. Thuillet, P. Andouard, O. Ly, A smart card power analysis simulator, in International Conference on Computational Science and Engineering, 2009. CSE’09, vol. 2 (IEEE, Piscataway, 2009), pp. 847–852
26.
Zurück zum Zitat A.G. Bayrak, F. Regazzoni, P. Brisk, F.-X. Standaert, P. Ienne, A first step towards automatic application of power analysis countermeasures, in Proceedings of the 48th Design Automation Conference (ACM, New York, 2011), pp. 230–235 A.G. Bayrak, F. Regazzoni, P. Brisk, F.-X. Standaert, P. Ienne, A first step towards automatic application of power analysis countermeasures, in Proceedings of the 48th Design Automation Conference (ACM, New York, 2011), pp. 230–235
27.
Zurück zum Zitat A.G. Bayrak, F. Regazzoni, D. Novo, P. Ienne. Sleuth: automated verification of software power analysis countermeasures, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2013), pp. 293–310 A.G. Bayrak, F. Regazzoni, D. Novo, P. Ienne. Sleuth: automated verification of software power analysis countermeasures, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2013), pp. 293–310
28.
Zurück zum Zitat A.G. Bayrak, F. Regazzoni, D. Novo, P. Brisk, F.-X. Standaert, P. Ienne, Automatic application of power analysis countermeasures. IEEE Trans. Comput. 64(2), 329–341 (2013)MathSciNetCrossRef A.G. Bayrak, F. Regazzoni, D. Novo, P. Brisk, F.-X. Standaert, P. Ienne, Automatic application of power analysis countermeasures. IEEE Trans. Comput. 64(2), 329–341 (2013)MathSciNetCrossRef
29.
Zurück zum Zitat S.A. Huss, O. Stein, A novel design flow for a security-driven synthesis of side-channel hardened cryptographic modules. J. Low Power Electron. Appl. 7(1), 4 (2017) S.A. Huss, O. Stein, A novel design flow for a security-driven synthesis of side-channel hardened cryptographic modules. J. Low Power Electron. Appl. 7(1), 4 (2017)
30.
Zurück zum Zitat Q. Luo, Y. Fei, Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacks, in 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, Piscataway, 2011), pp. 75–80 Q. Luo, Y. Fei, Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacks, in 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, Piscataway, 2011), pp. 75–80
31.
Zurück zum Zitat M. Yasin, B. Mazumdar, S.S. Ali, O. Sinanoglu, Security analysis of logic encryption against the most effective side-channel attack: DPA, in 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) (IEEE, Piscataway, 2015), pp. 97–102 M. Yasin, B. Mazumdar, S.S. Ali, O. Sinanoglu, Security analysis of logic encryption against the most effective side-channel attack: DPA, in 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) (IEEE, Piscataway, 2015), pp. 97–102
32.
Zurück zum Zitat A. Nahiyan, M. Sadi, R. Vittal, G. Contreras, D. Forte, M. Tehranipoor, Hardware trojan detection through information flow security verification, in 2017 IEEE International Test Conference (ITC) (IEEE, Piscataway, 2017), pp. 1–10 A. Nahiyan, M. Sadi, R. Vittal, G. Contreras, D. Forte, M. Tehranipoor, Hardware trojan detection through information flow security verification, in 2017 IEEE International Test Conference (ITC) (IEEE, Piscataway, 2017), pp. 1–10
33.
Zurück zum Zitat G.K. Contreras, A. Nahiyan, S. Bhunia, D. Forte, M. Tehranipoor, Security vulnerability analysis of design-for-test exploits for asset protection in SoCs, in 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) (IEEE, Piscataway, 2017), pp. 617–622 G.K. Contreras, A. Nahiyan, S. Bhunia, D. Forte, M. Tehranipoor, Security vulnerability analysis of design-for-test exploits for asset protection in SoCs, in 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) (IEEE, Piscataway, 2017), pp. 617–622
34.
Zurück zum Zitat M. Bushnell, V. Agrawal, Essentials of Electronic Testing for Digital, Memory and Mixed-Signal VLSI Circuits, vol. 17 (Springer, Berlin, 2004) M. Bushnell, V. Agrawal, Essentials of Electronic Testing for Digital, Memory and Mixed-Signal VLSI Circuits, vol. 17 (Springer, Berlin, 2004)
38.
Zurück zum Zitat Lookup table based AES Verilog design. Satoh Laboratory UEC (2018). Accessed 20 April 2018 Lookup table based AES Verilog design. Satoh Laboratory UEC (2018). Accessed 20 April 2018
39.
Zurück zum Zitat K. Tiri, I. Verbauwhede, Securing encryption algorithms against DPA at the logic level: next generation smart card technology, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2003), pp. 125–136 K. Tiri, I. Verbauwhede, Securing encryption algorithms against DPA at the logic level: next generation smart card technology, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2003), pp. 125–136
40.
Zurück zum Zitat S. Kullback, R.A. Leibler, On information and sufficiency. Ann. Math. Statist. 22(1):79–86 S. Kullback, R.A. Leibler, On information and sufficiency. Ann. Math. Statist. 22(1):79–86
41.
Zurück zum Zitat Y. Fei, A. Adam Ding, J. Lao, L. Zhang, A statistics-based fundamental model for side-channel attack analysis. Cryptology ePrint Archive, Report 2014/152, 2014 Y. Fei, A. Adam Ding, J. Lao, L. Zhang, A statistics-based fundamental model for side-channel attack analysis. Cryptology ePrint Archive, Report 2014/152, 2014
42.
Zurück zum Zitat S.S Keller, NIST-recommended random number generator based on ANSI x9. 31 appendix a. 2.4 using the 3-key triple DES and AES algorithms, in NIST Information Technology Laboratory-Computer Security Division, National Institute of Standards and Technology (2005) S.S Keller, NIST-recommended random number generator based on ANSI x9. 31 appendix a. 2.4 using the 3-key triple DES and AES algorithms, in NIST Information Technology Laboratory-Computer Security Division, National Institute of Standards and Technology (2005)
43.
Zurück zum Zitat G. Becker, J. Cooper, E. DeMulder, G. Goodwill, J. Jaffe, G. Kenworthy, T. Kouzminov, A. Leiserson, M. Marson, P. Rohatgi, et al., Test vector leakage assessment (TVLA) methodology in practice, in International Cryptographic Module Conference, vol. 1001 (2013), p. 13 G. Becker, J. Cooper, E. DeMulder, G. Goodwill, J. Jaffe, G. Kenworthy, T. Kouzminov, A. Leiserson, M. Marson, P. Rohatgi, et al., Test vector leakage assessment (TVLA) methodology in practice, in International Cryptographic Module Conference, vol. 1001 (2013), p. 13
44.
Zurück zum Zitat K. Xiao, A. Nahiyan, M. Tehranipoor, Security rule checking in IC design. Computer 49(8), 54–61 (2016)CrossRef K. Xiao, A. Nahiyan, M. Tehranipoor, Security rule checking in IC design. Computer 49(8), 54–61 (2016)CrossRef
45.
Zurück zum Zitat A. Nahiyan, K. Xiao, D. Forte, M. Tehranipoor, Security rule check, in Hardware IP Security and Trust (Springer, Berlin, 2017), pp. 17–36CrossRef A. Nahiyan, K. Xiao, D. Forte, M. Tehranipoor, Security rule check, in Hardware IP Security and Trust (Springer, Berlin, 2017), pp. 17–36CrossRef
Metadaten
Titel
CAD for Side-Channel Leakage Assessment
verfasst von
Adib Nahiyan
Miao (Tony) He
Jungmin Park
Mark Tehranipoor
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-64448-2_7

Neuer Inhalt