A solitary protection measure against scan chain, fault injection, and power analysis attacks on AES

With the increase in usage of low-power electronics in security critical area, demand for secure transmission of private and confidential information is on the rise. Implementation of dedicated hardware for cryptography is essential nowadays, even in the resource-constrained devices, to meet high-security concerns. However, hardware implementation of cryptographic algorithms may result in security vulnerabilities. Scan-chain-based attack (SBA), fault-injection attack (FIA), and power analysis attack (PAA) are three popular cryptanalysis techniques in exploiting vulnerabilities of crypto-chips. Employing multiple strategies for counteracting the attacks results in significant resource overheads in the cryptographic chips. In this paper, we present a novel and solitary approach to prevent either type of attacks on the hardware implementation of Advanced Encryption Standard (AES). Two additional layers, controlled by true random number generator, are introduced in the proposed technique to conceal sensitive data stored in memory bank. One layer permutes and masks intermediate state before storing in registers, and the other layer is used to reconstruct intermediate state at the start of the round operations of AES. With a two-third increase in resource overhead and negligible increase in timing overhead compared to the regular AES datapath, the proposed technique makes the system resilient against SBA, FIA as well as PAA.

[1]  Moti Yung,et al.  A Comparative Cost/Security Analysis of Fault Attack Countermeasures , 2006, FDTC.

[2]  Miodrag Potkonjak,et al.  Security of IoT systems: Design challenges and opportunities , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[3]  Christophe Giraud,et al.  DFA on AES , 2004, AES Conference.

[4]  Nathalie Bochard,et al.  Enhancing security of ring oscillator-based trng implemented in FPGA , 2008, 2008 International Conference on Field Programmable Logic and Applications.

[5]  Michel Renovell,et al.  Scan Design and Secure Chip , 2004, IOLTS.

[6]  Ramesh Karri,et al.  Secure scan: a design-for-test architecture for crypto chips , 2005, Proceedings. 42nd Design Automation Conference, 2005..

[7]  Stefan Mangard,et al.  Successfully Attacking Masked AES Hardware Implementations , 2005, CHES.

[8]  Abdel Alim Kamal,et al.  An FPGA implementation of AES with fault analysis countermeasures , 2009, 2009 International Conference on Microelectronics - ICM.

[9]  Jean-Max Dutertre,et al.  A side-channel and fault-attack resistant AES circuit working on duplicated complemented values , 2011, 2011 IEEE International Solid-State Circuits Conference.

[10]  Ramesh Karri,et al.  Secure Scan: A Design-for-Test Architecture for Crypto Chips , 2006, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[11]  Yajun Ha,et al.  An area-efficient shuffling scheme for AES implementation on FPGA , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).

[12]  Mark Mohammad Tehranipoor,et al.  A low-cost solution for protecting IPs against scan-based side-channel attacks , 2006, 24th IEEE VLSI Test Symposium.

[13]  Swarup Bhunia,et al.  VIm-Scan: A Low Overhead Scan Design Approach for Protection of Secret Key in Scan-Based Secure Chips , 2007, 25th IEEE VLSI Test Symposium (VTS'07).