Abstract
In this paper, we present a compact hardware platform for power analysis attacks such as a differential power analysis attack. The board is equipped with FPGA chip (namely Altera Cyclone III) and four different measurement points. We provide hardware details of the presented platform and we thoroughly present each of the points dedicated for power consumption measurements. They are used for an extraction of vulnerable information through the power counsumption measured during cryptographic operations. In addition, we provide an example of the power analysis attack based on the differential power analysis. We show properties of the board using attacks on straightforward AES S-box operations and on scalable multiplications in the elliptic curve digital signature algorithm.
Highlights
Embedded devices running implementations of cryptographic algorithms such as Field-Programmable Gate Arrays (FPGAs) or MicroController Units (MCUs) are often targets for Side-Channel Attacks (SCAs) [1]
We focus on attacks based power consumption analysis and their countermeasures, especially on a Correlation Based Differential Power Analysis (CBDPA) [7]
Other power analysis attacks are for example Simple Power Analysis (SPA) [8] which can extract secret information from a shape of a single power consumption trace or other Differential Power Analyses (DPA) [9] which uses statistical tools to recover vulnerable data
Summary
Embedded devices running implementations of cryptographic algorithms such as Field-Programmable Gate Arrays (FPGAs) or MicroController Units (MCUs) are often targets for Side-Channel Attacks (SCAs) [1]. Other power analysis attacks are for example Simple Power Analysis (SPA) [8] which can extract secret information from a shape of a single power consumption trace or other Differential Power Analyses (DPA) [9] which uses statistical tools to recover vulnerable data. In order to develop new attacks and especially new countermeasures, researchers need to have reference platforms where experiments with reproducible conditions can be performed. One of the most widespread boards for SCA based on FPGA is Side-channel Attack Standard Evaluation BOard (SASEBO) [14]. Our research team uses a custom evaluation board based on MCU (e.g. in [16]) with which we detect new attacks and develop new countermeasures for cryptographic algorithms implementations implemented on MCUs
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have