Abstract

In this paper, we present a compact hardware platform for power analysis attacks such as a differential power analysis attack. The board is equipped with FPGA chip (namely Altera Cyclone III) and four different measurement points. We provide hardware details of the presented platform and we thoroughly present each of the points dedicated for power consumption measurements. They are used for an extraction of vulnerable information through the power counsumption measured during cryptographic operations. In addition, we provide an example of the power analysis attack based on the differential power analysis. We show properties of the board using attacks on straightforward AES S-box operations and on scalable multiplications in the elliptic curve digital signature algorithm.

Highlights

  • Embedded devices running implementations of cryptographic algorithms such as Field-Programmable Gate Arrays (FPGAs) or MicroController Units (MCUs) are often targets for Side-Channel Attacks (SCAs) [1]

  • We focus on attacks based power consumption analysis and their countermeasures, especially on a Correlation Based Differential Power Analysis (CBDPA) [7]

  • Other power analysis attacks are for example Simple Power Analysis (SPA) [8] which can extract secret information from a shape of a single power consumption trace or other Differential Power Analyses (DPA) [9] which uses statistical tools to recover vulnerable data

Read more

Summary

INTRODUCTION

Embedded devices running implementations of cryptographic algorithms such as Field-Programmable Gate Arrays (FPGAs) or MicroController Units (MCUs) are often targets for Side-Channel Attacks (SCAs) [1]. Other power analysis attacks are for example Simple Power Analysis (SPA) [8] which can extract secret information from a shape of a single power consumption trace or other Differential Power Analyses (DPA) [9] which uses statistical tools to recover vulnerable data. In order to develop new attacks and especially new countermeasures, researchers need to have reference platforms where experiments with reproducible conditions can be performed. One of the most widespread boards for SCA based on FPGA is Side-channel Attack Standard Evaluation BOard (SASEBO) [14]. Our research team uses a custom evaluation board based on MCU (e.g. in [16]) with which we detect new attacks and develop new countermeasures for cryptographic algorithms implementations implemented on MCUs

PLATFORM AND MEASUREMENT SETUP
ALTERA
Attack on the Byte Substitution in the AES Algorithm
CONCLUSION
Attack on the Scalable Multiplication in a Protected ECDSA
Evaluation
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call