In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its vulnerability to Side Channel Attacks Exploiting Static Power is investigated. In the last two decades, several countermeasures to thwart DPA/CPA attacks based on the exploitation of dynamic power consumption have been proposed. In particular, WDDL logic style is a gate-level countermeasure, to Power Analysis Attacks exploiting dynamic Power. It has been demonstrated that, in deep sub-micron technologies, the static power consumption is no more negligible as in the past and malicious attackers can benefit from the dependability of the static power consumption on the processed data: Leakage Power Analysis (LPA) has been proposed to recover sensible information. The possibility to recover the secret key from a protected secure implementation exploiting static power is not a minor threat, and we analyze this vulnerability with actual security metrics and with an information theoretic approach, showing that gate level countermeasures such as WDDL can be successfully attacked exploiting static power instead of dynamic power.

Implementation of the present-80 block cipher and analysis of its vulnerability to side channel attacks exploiting static power / Bellizia, Davide; Scotti, Giuseppe; Trifiletti, Alessandro. - ELETTRONICO. - (2016), pp. 211-216. (Intervento presentato al convegno 23rd International Conference Mixed Design of Integrated Circuits and Systems, MIXDES 2016 tenutosi a Lodz; Poland) [10.1109/MIXDES.2016.7529734].

Implementation of the present-80 block cipher and analysis of its vulnerability to side channel attacks exploiting static power

BELLIZIA, DAVIDE;SCOTTI, Giuseppe;TRIFILETTI, Alessandro
2016

Abstract

In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its vulnerability to Side Channel Attacks Exploiting Static Power is investigated. In the last two decades, several countermeasures to thwart DPA/CPA attacks based on the exploitation of dynamic power consumption have been proposed. In particular, WDDL logic style is a gate-level countermeasure, to Power Analysis Attacks exploiting dynamic Power. It has been demonstrated that, in deep sub-micron technologies, the static power consumption is no more negligible as in the past and malicious attackers can benefit from the dependability of the static power consumption on the processed data: Leakage Power Analysis (LPA) has been proposed to recover sensible information. The possibility to recover the secret key from a protected secure implementation exploiting static power is not a minor threat, and we analyze this vulnerability with actual security metrics and with an information theoretic approach, showing that gate level countermeasures such as WDDL can be successfully attacked exploiting static power instead of dynamic power.
2016
23rd International Conference Mixed Design of Integrated Circuits and Systems, MIXDES 2016
CMOS; cryptography; information security; leakage; side channel attack; static power; WDDL; instrumentation; electronic, optical and magnetic materials; signal processing; electrical and electronic engineering
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Implementation of the present-80 block cipher and analysis of its vulnerability to side channel attacks exploiting static power / Bellizia, Davide; Scotti, Giuseppe; Trifiletti, Alessandro. - ELETTRONICO. - (2016), pp. 211-216. (Intervento presentato al convegno 23rd International Conference Mixed Design of Integrated Circuits and Systems, MIXDES 2016 tenutosi a Lodz; Poland) [10.1109/MIXDES.2016.7529734].
File allegati a questo prodotto
File Dimensione Formato  
Bellizia_Implementation_2016.pdf

solo utenti autorizzati

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.24 MB
Formato Adobe PDF
1.24 MB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/961547
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 18
  • ???jsp.display-item.citation.isi??? 11
social impact