Towards a framework to perform DPA attack on GALS pipeline architectures

Differential power analysis (DPA) is a low cost method to extract secret information from supposedly secure cryptographic systems. DPA correlates the data processed with power consumption of the device through statistical analyses to unveil the secret key of the system. A common approach to counteract DPA is randomizing the data processing in order to misalign power consumption traces in time and amplitude domains using strategies such as random delay insertion and random clock frequency. The combination of strategies requires more computational effort for a successful DPA attack. This paper introduces the first steps toward a framework to compromise cryptographic systems that combine misalignment strategies to hide leakage information. The steps of the proposed framework are discussed in terms of computational efforts and successful attacks rate. The results obtained in an architecture prototyped on FPGA show that noise filtering can significantly improve the DPA success rate. Furthermore, clustering traces by frequency allow the improvement of the alignment step, thus increasing about 40 times the efficiency of the DPA attack to the cost of an increase of the computational efforts.

[1]  Fernando Gehm Moraes,et al.  A Robust Architectural Approach for Cryptographic Algorithms Using GALS Pipelines , 2011, IEEE Design & Test of Computers.

[2]  Catherine H. Gebotys,et al.  A countermeasure for EM attack of a wireless PDA , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[3]  Máire O'Neill,et al.  FPGA implementation and analysis of random delay insertion countermeasure against DPA , 2008, 2008 International Conference on Field-Programmable Technology.

[4]  Akashi Satoh,et al.  High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching , 2006, CHES.

[5]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[6]  Y. V. Venkatesh,et al.  On the uncertainty inequality as applied to discrete signals , 2006, Int. J. Math. Math. Sci..

[7]  Denis Réal,et al.  Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis , 2008, 2008 Design, Automation and Test in Europe.

[8]  Sorin A. Huss,et al.  On Clock Frequency Effects in Side Channel Attacks of Symmetric Block Ciphers , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[9]  Bart Preneel,et al.  Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? , 2004, CHES.

[10]  Jasper G. J. van Woudenberg,et al.  Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.

[11]  Sorin A. Huss,et al.  A General Approach to Power Trace Alignment for the Assessment of Side-Channel Resistance of Hardened Cryptosystems , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[12]  Christophe Clavier,et al.  Differential Power Analysis in the Presence of Hardware Countermeasures , 2000, CHES.

[13]  Akashi Satoh,et al.  DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[14]  Arun K. Somani,et al.  Countering Power Analysis Attacks UsingReliable and Aggressive Designs , 2014, IEEE Transactions on Computers.

[15]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[16]  J. Shynk Frequency-domain and multirate adaptive filtering , 1992, IEEE Signal Processing Magazine.

[17]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[18]  Sylvain Guilley,et al.  Novel Applications of Wavelet Transforms based Side-Channel Analysis , 2011 .