Pre-Processing Power Traces to Defeat Random Clocking Countermeasures


Autoria(s): Hodgers, Philip; Hanley, Neil; O'Neill, Maire
Data(s)

27/05/2015

Resumo

We describe a pre-processing correlation attack on an FPGA implementation of AES, protected with a random clocking countermeasure that exhibits complex variations in both the location and amplitude of the power consumption patterns of the AES rounds. It is demonstrated that the merged round patterns can be pre-processed to identify and extract the individual round amplitudes, enabling a successful power analysis attack. We show that the requirement of the random clocking countermeasure to provide a varying execution time between processing rounds can be exploited to select a sub-set of data where sufficient current decay has occurred, further improving the attack. In comparison with the countermeasure's estimated security of 3 million traces from an integration attack, we show that through application of our proposed techniques that the countermeasure can now be broken with as few as 13k traces.

Formato

application/pdf

Identificador

http://pure.qub.ac.uk/portal/en/publications/preprocessing-power-traces-to-defeat-random-clocking-countermeasures(a51708ef-7bd7-440d-942d-4f13c60d4b16).html

http://dx.doi.org/10.1109/ISCAS.2015.7168576

http://pure.qub.ac.uk/ws/files/17844718/ISCAS_Pre_Press.pdf

Idioma(s)

eng

Publicador

Institute of Electrical and Electronics Engineers (IEEE)

Direitos

info:eu-repo/semantics/openAccess

Fonte

Hodgers , P , Hanley , N & O'Neill , M 2015 , Pre-Processing Power Traces to Defeat Random Clocking Countermeasures . in IEEE International Symposium on Circuits and Systems (ISCAS), 2015 . Institute of Electrical and Electronics Engineers (IEEE) , pp. 85-88 , IEEE International Symposium on Circuits and Systems (ISCAS), 2015 , Lisbon , Portugal , 24-27 May . DOI: 10.1109/ISCAS.2015.7168576

Palavras-Chave #Power analysis #random clocking countermeasure
Tipo

contributionToPeriodical