Abstract

Power attack is the most powerful side channel attacks in cryptography chip during VLSI (Very Large Scale Integration) testing. Hackers attack the target devices by means of power through finding the correlations between the power spikes for different input generated on Cathode Ray Oscilloscope (CRO). To overcome such a great issues we proposed the novel techniques for cryptography devices which perform their crypto functions without an external power source. Energy required to do the cryptographic operation is provided by Embedded Capacitance Power Supply (ECPS) method, which is integrated with the VLSI device. Group of capacitors are connected to form the power supply, which act as the temporary battery of the cryptographic chip. The power spikes for this crypto operation not visible by the CRO. Hence it is complicate for attackers to hack the crypto system. The proposed method is modelled through Hardware Description Language (HDL) Verilog-AMS using Switch Level Modelling and result is verified by simulation wave form generated.

Highlights

  • To gain the sensitive information from cryptographic devices, hacker attacks the target device through the side channel during a Device Under Test (DUT) in VLSI testing

  • Digital method[8], Shift Invert Code, Bit Invert Code, Gray Code, T0 code, Beach code, Parity error check for Linear Feedback Shift Register (LFSR),Von Neumann Corrector method are introduced against power attacks which make changes in hamming distances and reduced the power consumption in the circuit

  • In our Embedded Capacitance Power Supply (ECPS) method, we divide the supply power based on mode of operation in cryptographic devices

Read more

Summary

Introduction

To gain the sensitive information from cryptographic devices, hacker attacks the target device through the side channel during a Device Under Test (DUT) in VLSI testing. Side channel power attacks in device will determine the simple relationship between power consumption for the different cryptographic operations like encryption by adding an extra key. Origin of side channel secret data leakage is dependent on power consumption These power attacks in crypto devices mainly divided into two types. Simple power analysis tried to determine the power consumption of devices for different function to rob information on devices It is a common technique which depends only in determining the amount of the electric current flows through the microcontroller, find by cryptographer Kocher[1]. Differential power analysis attack is stronger than Simple Power Analysis and it uses additional information like hamming distance values It involves two steps, collection of power report data and making analysis on its collected report.

Existing System
Bus Invert Code
Shift Invert Code
Von Neumann Corrector
Beach Code
Proposed System
Capacitance as Power Generator System
Experimental Result
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call