In this work the effectiveness of Leakage Power Analysis (LPA), a new class of side-channel attacks against cryptographic circuits, has been demonstrated on a case study. LPA attacks have been mounted against a bit slice implementation of the Serpent block cipher. After having measured the leakage contribution of a bit slice unit inside the processor, chosen as selection function for LPA attacks, an adequate power model has been identified. In order to consider the on-chip noise due to the static consumption of the other logics inside the processor, an estimation of the SNR has been provided according to the count of equivalent gates. The bit slice sub-block has been designed in a 65nm CMOS technology node for different logic styles, i.e. CMOS, WDDL, MDPL, and SABL. Simulations show that for each logic implementation the correct key of the algorithm has been recovered with a maximum of 50.000 measurements, demonstrating that LPA attack can be successfully carried out against a wide range of logic styles, even if they efficiently thwart standard DPA and CPA attacks. Static power is expected to become greater in downscaled technologies, and thus LPA must be considered a serious threat for the security of cryptographic VLSI circuits. © 2014 Department of Microelectronics and Computer Science.

Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher / Alioto, M.; Bongiovanni, S.; Scotti, G.; Trifiletti, A.. - (2014), pp. 241-246. (Intervento presentato al convegno 21st International Conference on Mixed Design of Integrated Circuits and Systems, MIXDES 2014 tenutosi a Lublin, pol) [10.1109/MIXDES.2014.6872193].

Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher

Bongiovanni S.;Scotti G.;Trifiletti A.
2014

Abstract

In this work the effectiveness of Leakage Power Analysis (LPA), a new class of side-channel attacks against cryptographic circuits, has been demonstrated on a case study. LPA attacks have been mounted against a bit slice implementation of the Serpent block cipher. After having measured the leakage contribution of a bit slice unit inside the processor, chosen as selection function for LPA attacks, an adequate power model has been identified. In order to consider the on-chip noise due to the static consumption of the other logics inside the processor, an estimation of the SNR has been provided according to the count of equivalent gates. The bit slice sub-block has been designed in a 65nm CMOS technology node for different logic styles, i.e. CMOS, WDDL, MDPL, and SABL. Simulations show that for each logic implementation the correct key of the algorithm has been recovered with a maximum of 50.000 measurements, demonstrating that LPA attack can be successfully carried out against a wide range of logic styles, even if they efficiently thwart standard DPA and CPA attacks. Static power is expected to become greater in downscaled technologies, and thus LPA must be considered a serious threat for the security of cryptographic VLSI circuits. © 2014 Department of Microelectronics and Computer Science.
2014
21st International Conference on Mixed Design of Integrated Circuits and Systems, MIXDES 2014
Cryptography; Leakage; Power analysis; Security; Side-channel; Smart-card; Static power; VLSI
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher / Alioto, M.; Bongiovanni, S.; Scotti, G.; Trifiletti, A.. - (2014), pp. 241-246. (Intervento presentato al convegno 21st International Conference on Mixed Design of Integrated Circuits and Systems, MIXDES 2014 tenutosi a Lublin, pol) [10.1109/MIXDES.2014.6872193].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1615002
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 10
  • ???jsp.display-item.citation.isi??? 7
social impact