Novel measurements setup for attacks exploiting static power using DC pico-ammeter

The static power consumption in modern integrated circuits has become a critical standpoint in side-channel analysis. As it has been widely demonstrated in the technical literature, it is possible to extract secret information from a cryptographic circuit by means of static current measurements. Static and dynamic power analysis require different measurement procedures, due to physical reasons. In this work, we present a novel measurement setup, which aims to overcome several issues in measuring static currents, such as extremely low SNR and temperature dependency, providing a low-cost solution to carry out Attacks Exploiting Static Power (AESP). The proposed measurement setup is based on a DC pico-ammeter, which allows to acquire DC currents after a long integration time, and on a thermal feedback loop exploiting a commercial Peltier cell to set and control the working temperature of the cryptographic processor. To verify the effectiveness of the proposed setup, AESP have been successfully implemented on a 4×4 bit crypto-core, extracted from a bit slice implementation of the PRESENT-80 algorithm and implemented on a 45nm Xilinx Spartan-6 FPGA.

[1]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[2]  Alessandro Trifiletti,et al.  Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits , 2010, IEEE Transactions on Circuits and Systems I: Regular Papers.

[3]  Alessandro Trifiletti,et al.  Leakage Power Analysis attacks: Theoretical analysis and impact of variations , 2009, 2009 16th IEEE International Conference on Electronics, Circuits and Systems - (ICECS 2009).

[4]  Alessandro Trifiletti,et al.  Univariate Power Analysis Attacks Exploiting Static Dissipation of Nanometer CMOS VLSI Circuits for Cryptographic Applications , 2017, IEEE Transactions on Emerging Topics in Computing.

[5]  Amir Moradi,et al.  Side-Channel Leakage through Static Power - Should We Care about in Practice? , 2014, CHES.

[6]  Kaushik Roy,et al.  Low-Power CMOS VLSI Circuit Design , 2000 .

[7]  Amir Moradi,et al.  Static power side-channel analysis of a threshold implementation prototype chip , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[8]  Amir Moradi,et al.  Side-channel attacks from static power: When should we care? , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[9]  Alessandro Trifiletti,et al.  Implementation of the PRESENT-80 block cipher and analysis of its vulnerability to Side Channel Attacks Exploiting Static Power , 2016, 2016 MIXDES - 23rd International Conference Mixed Design of Integrated Circuits and Systems.

[10]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[11]  Stefan Mangard,et al.  Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness , 2004, CT-RSA.

[12]  Alessandro Trifiletti,et al.  Template attacks exploiting static power and application to CMOS lightweight crypto‐hardware , 2017, Int. J. Circuit Theory Appl..

[13]  Alessandro Trifiletti,et al.  Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications , 2017, AFRICACRYPT.