Abstract
Cryptographic devices, which are embedded in SoC systems and mathematically secured algorithms, are used for operating it. But a side channel leakage may cause the secret data in these systems to be at high risk. Particularly, cryptography circuits like ECC algorithm are prone to power attacks like correlation power analysis (CPA) and differential power analysis (DPA). Hence, it is necessary to safeguard the sensitive information using proposed method having ECC with countermeasure. This paper focuses on protecting sensitive information using chaotic countermeasure as reconfigurable architecture by adopting ARTIX-7 board and offline ELM algorithm to detect the attack. In this, an effective countermeasure is designed and implemented using the FPGA for attack detection. Moreover, the proposed chaotic architecture has been integrated with ECC bit key mounted on ARTIX-7 board and tested nearly with 250 power traces recorded from the architecture. We have compared the proposed chaotic maps with the other current countermeasure technique, such as WDDL, IVR, and inductive ECC, in which the proposed design outperforms the above described existing structures in terms of area usage, power overhead, and frequency overhead. And to verify the strength of the encryption algorithm by using NIST to ensure that the given random number can be used for cryptographic purposes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D. Hwang, K. Tiri, A. Hodjat et al., AES-based security coprocessor IC in 0.18-μm (2006)
M. Doulcier-Verdier, D. Jean-Max, F. Jacquesm et al., Aside-channel and fault-attack resistant AES circuit working on duplicated complemented values. ISSCC Digest of Technical Papers (2011), pp. 274–275
A. Moradi, A. Poschmann, S. Ling, C. Paar, H. Wang, Pushing the limits: a very compact and a threshold implementation of AES’. Adv. Cryptol. EUROCRYPT 69–88 (2011)
M. Kar, A. Singh, M. Sanu et al., Improved power-side-channelattack resistance of an AES-128 core via a security-aware integrated buck voltage regulator. ISSCC Digest of Technical Papers (2017), pp. 141–142
W. Shan, X. Fu, Z. Xu, A secure reconfigurable crypto IC with countermeasures against SPA, DPA and EMA. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 34 (7), 1201–1205 (2015)
W. Shan;Â S. Zhang;Â Y. He, Machine learning-based side-channel-attack countermeasure with hamming-distance redistribution and its application on advanced encryption standard. Electron. Lett. 53(14), 7 6 (2017)
D.A. Silva, E.B. Pereira, E.G. Nepomuceno, Implementation of the logistic map with FPGA using 32 bits fixed point standard. in XIII SimposioBrasileiro de AutomacaoInteligente—SBAI2017, Porto Alegre, Brazil. In Portugues, Fri, 11 Aug (2017)
A. Pande, J. Zambreno, Design and hardware ımplementation of a chaotic encryption scheme for real-time embedded systems. in An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map, Security and CommunicationNetworks (2018)
M. Zhao, G. Edward Suh, FPGA-based remote power side-channel attacks. in 2018 IEEE Symposium on Security and Privacy (2018)
A. Srivastava, P. Ghosh, An efficient memory zeroization technique under side-channel attacks. in 32nd International Conference on VLSI Design (2019)
A. Singh, N. Chawla, J.-H. Ko, Energy efficient and side-channel secure cryptographic hardware for IoT-edge nodes. IEEE Internet of Things J. 6(1), (2019)
https://csrc.nist.gov/projects/random-bit-generation/documentation-and-software
B. Illuri, D. Jose, Design and implementation of hybrid integration of cognitive learning and chaotic countermeasures for side channel attacks. J. Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02030-x
L. Punitha, K.N. Devi, D. Jose, J. Sundararajan, Design of double edge-triggered flip-flop for low-power educational environment. Int. J. Electri. Eng. Educ. 2-s2.0–85070403539 (2019)
M. Baskar, T. Gnanasekaran, Developing efficient intrusion tracking system using region based traffic impact measure towards the denial of service attack mitigation. 14(7), 3576–3582 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Illuri, B., Jose, D., David, S., Nagarjuan, M. (2022). Machine Learning Based and Reconfigurable Architecture with a Countermeasure for Side Channel Attacks. In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_14
Download citation
DOI: https://doi.org/10.1007/978-981-16-5529-6_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5528-9
Online ISBN: 978-981-16-5529-6
eBook Packages: EngineeringEngineering (R0)