The static power consumption in modern integrated circuits has become a critical standpoint in side-channel analysis. As it has been widely demonstrated in the technical literature, it is possible to extract secret information from a cryptographic circuit by means of static current measurements. Static and dynamic power analysis require different measurement procedures, due to physical reasons. In this work, we present a novel measurement setup, which aims to overcome several issues in measuring static currents, such as extremely low SNR and temperature dependency, providing a low-cost solution to carry out Attacks Exploiting Static Power (AESP). The proposed measurement setup is based on a DC pico-ammeter, which allows to acquire DC currents after a long integration time, and on a thermal feedback loop exploiting a commercial Peltier cell to set and control the working temperature of the cryptographic processor. To verify the effectiveness of the proposed setup, AESP have been successfully implemented on a 4�4 bit crypto-core, extracted from a bit slice implementation of the PRESENT-80 algorithm and implemented on a 45nm Xilinx Spartan-6 FPGA.

Novel measurements setup for attacks exploiting static power using DC pico-ammeter / Bellizia, Davide; Cellucci, Danilo; Di Stefano, Valerio; Scotti, Giuseppe; Trifiletti, Alessandro. - ELETTRONICO. - (2017), pp. 1-4. (Intervento presentato al convegno 2017 European Conference on Circuit Theory and Design (ECCTD) tenutosi a Catania; Italy nel 4-6 Settembre 2017) [10.1109/ECCTD.2017.8093333].

Novel measurements setup for attacks exploiting static power using DC pico-ammeter

Bellizia, Davide
;
Scotti, Giuseppe;Trifiletti, Alessandro
2017

Abstract

The static power consumption in modern integrated circuits has become a critical standpoint in side-channel analysis. As it has been widely demonstrated in the technical literature, it is possible to extract secret information from a cryptographic circuit by means of static current measurements. Static and dynamic power analysis require different measurement procedures, due to physical reasons. In this work, we present a novel measurement setup, which aims to overcome several issues in measuring static currents, such as extremely low SNR and temperature dependency, providing a low-cost solution to carry out Attacks Exploiting Static Power (AESP). The proposed measurement setup is based on a DC pico-ammeter, which allows to acquire DC currents after a long integration time, and on a thermal feedback loop exploiting a commercial Peltier cell to set and control the working temperature of the cryptographic processor. To verify the effectiveness of the proposed setup, AESP have been successfully implemented on a 4�4 bit crypto-core, extracted from a bit slice implementation of the PRESENT-80 algorithm and implemented on a 45nm Xilinx Spartan-6 FPGA.
2017
2017 European Conference on Circuit Theory and Design (ECCTD)
cryptography; current measurement; power demand; power measurement; signal to noise ratio; temperature control; temperature measurement; attack exploiting static power; cryptography; leakage power analysis; side channel attack; nanometer CMOS; static current
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Novel measurements setup for attacks exploiting static power using DC pico-ammeter / Bellizia, Davide; Cellucci, Danilo; Di Stefano, Valerio; Scotti, Giuseppe; Trifiletti, Alessandro. - ELETTRONICO. - (2017), pp. 1-4. (Intervento presentato al convegno 2017 European Conference on Circuit Theory and Design (ECCTD) tenutosi a Catania; Italy nel 4-6 Settembre 2017) [10.1109/ECCTD.2017.8093333].
File allegati a questo prodotto
File Dimensione Formato  
Bellizia_Novel-measurements_2017.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 338.57 kB
Formato Adobe PDF
338.57 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1026452
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 13
  • ???jsp.display-item.citation.isi??? 0
social impact