A Novel Countermeasure Enhancing Side Channel Immunity in FPGAs

Side channel attacks (SCAs) are very effective in extracting information from algorithmically secure systems. Since, the earliest reports of attacks exploiting side channels such as power consumption, timing behavior and electromagnetic radiation etc., the countermeasures to resist such attacks have also been proposed. FPGAs originally thought to be resistant to such attacks because of some inherent characteristics were also found to leak information over the side channels. Overtime, SCA countermeasures have been proposed that continue to fade away as resistant attack techniques are developed. In this article an FPGA implementation of a multi-clock system with cipher embodiment, incorporating a novel countermeasure to resist SCAs, is presented. The proposed methodology of embedding single inverter ring oscillators (SIROs) within the synchronous cores helps improve immunity against electromagnetic, fault and glitch attacks, while the introduction of frequency hopping by randomly varying frequency driving the cipher hardens the system against power and timing attacks. The incorporated countermeasure enhances the immunity of FPGA based implementation against multiple types of SCAs without adversely affecting cost or performance.

[1]  Christof Paar,et al.  Security on FPGAs: State-of-the-art implementations and attacks , 2004, TECS.

[2]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[3]  Wolfgang Fichtner,et al.  Design Challenges for a Differential-Power-Analysis Aware GALS-based AES Crypto ASIC , 2006, Electron. Notes Theor. Comput. Sci..

[4]  Hervé Chabanne,et al.  Electromagnetic Side Channels of an FPGA Implementation of AES , 2004, IACR Cryptol. ePrint Arch..

[5]  Eric Peeters,et al.  Updates on the Security of FPGAs Against Power Analysis Attacks , 2006, ARC.

[6]  Y. Zafar,et al.  Adaptive on-chip oscillator for FPGA based synchronous designs , 2005, Proceedings of the IEEE Symposium on Emerging Technologies, 2005..

[7]  Jan M. Rabaey,et al.  Digital Integrated Circuits , 2003 .

[8]  FRANÇOIS-XAVIER STANDAERT,et al.  An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays , 2006, Proceedings of the IEEE.

[9]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[10]  Yousaf Zafar,et al.  A novel FPGA compliant micropipeline , 2005, IEEE Transactions on Circuits and Systems II: Express Briefs.

[11]  Bart Preneel,et al.  Power-Analysis Attacks on an FPGA - First Experimental Results , 2003, CHES.

[12]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[13]  Christof Paar,et al.  Cryptography on FPGAs: State of the Art Implementations and Attacks , 2003 .

[14]  Bart Preneel,et al.  Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? , 2004, CHES.

[15]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[16]  Li Shang,et al.  Dynamic power consumption in Virtex™-II FPGA family , 2002, FPGA '02.

[17]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.