Information Theoretic Evaluation of Side-Channel Resistant Logic Styles

We propose to apply an information theoretic metric to the evaluation of side-channel resistant logic styles. Due to the long design and development time required for the physical evaluation of such hardware countermeasures, our analysis is based on simulations. Although they do not aim to replace the need of actual measurements, we show that simulations can be used as a meaningful first step in the validation chain of a cryptographic product. For illustration purposes, we apply our methodology to gate-level simulations of different logic styles and stress that it allows a significant improvement of the previously considered evaluation methods. In particular, our results allow putting forward the respective strengths and weaknesses of actual countermeasures and determining to which extent they can practically lead to secure implementations (with respect to a noise parameter), if adversaries were provided with simulation-based side-channel traces. Most importantly, the proposed methodology can be straightforwardly adapted to adversaries provided with any other kind of leakage traces (including physical ones).

[1]  Eric Peeters,et al.  Template Attacks in Principal Subspaces , 2006, CHES.

[2]  Ingrid Verbauwhede,et al.  A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[3]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[4]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[5]  Ingrid Verbauwhede,et al.  Design method for constant power consumption of differential logic circuits , 2005, Design, Automation and Test in Europe.

[6]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[7]  Sylvain Guilley,et al.  The backend duplication method : A leakage-proof place-and-route strategy for ASICs , 2005 .

[8]  Daisuke Suzuki,et al.  Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style , 2006, CHES.

[9]  Ingrid Verbauwhede,et al.  Simulation models for side-channel information leaks , 2005, Proceedings. 42nd Design Automation Conference, 2005..

[10]  George S. Taylor,et al.  Security Evaluation of Asynchronous Circuits , 2003, CHES.

[11]  M. Yung,et al.  A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks , 2006 .

[12]  Jean-Didier Legat,et al.  A Dynamic Current Mode Logic to Counteract Power Analysis Attacks , 2004 .

[13]  Eric Peeters,et al.  Towards Security Limits in Side-Channel Attacks , 2006, CHES.

[14]  M. I. Elmasry,et al.  Dynamic current mode logic (DyCML): a new low-power high-performance logic style , 2001, IEEE J. Solid State Circuits.

[15]  T. Eisenbarth Theoretical Models for Side-Channel Attacks , 2008 .

[16]  Stefan Mangard,et al.  Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.

[18]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[19]  Wieland Fischer,et al.  Masking at Gate Level in the Presence of Glitches , 2005, CHES.

[20]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[21]  Denis Flandre,et al.  Low-swing current mode logic (LSCML): A new logic style for secure and robust smart cards against power analysis attacks , 2006, Microelectron. J..

[22]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[23]  Stefan Mangard,et al.  Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.

[24]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[25]  Ingrid Verbauwhede,et al.  Place and Route for Secure Standard Cell Design , 2004, CARDIS.

[26]  Simon W. Moore,et al.  Security evaluation against electromagnetic analysis at design time , 2005, Tenth IEEE International High-Level Design Validation and Test Workshop, 2005..

[27]  Sylvain Guilley,et al.  The "Backend Duplication" Method , 2005, CHES.

[28]  Eric Peeters,et al.  Towards security limits in side-channel attacks (with an application to block ciphers) , 2006 .