Skip to main content

Machine Learning Based and Reconfigurable Architecture with a Countermeasure for Side Channel Attacks

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 311))

Abstract

Cryptographic devices, which are embedded in SoC systems and mathematically secured algorithms, are used for operating it. But a side channel leakage may cause the secret data in these systems to be at high risk. Particularly, cryptography circuits like ECC algorithm are prone to power attacks like correlation power analysis (CPA) and differential power analysis (DPA). Hence, it is necessary to safeguard the sensitive information using proposed method having ECC with countermeasure. This paper focuses on protecting sensitive information using chaotic countermeasure as reconfigurable architecture by adopting ARTIX-7 board and offline ELM algorithm to detect the attack. In this, an effective countermeasure is designed and implemented using the FPGA for attack detection. Moreover, the proposed chaotic architecture has been integrated with ECC bit key mounted on ARTIX-7 board and tested nearly with 250 power traces recorded from the architecture. We have compared the proposed chaotic maps with the other current countermeasure technique, such as WDDL, IVR, and inductive ECC, in which the proposed design outperforms the above described existing structures in terms of area usage, power overhead, and frequency overhead. And to verify the strength of the encryption algorithm by using NIST to ensure that the given random number can be used for cryptographic purposes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D. Hwang, K. Tiri, A. Hodjat et al., AES-based security coprocessor IC in 0.18-μm (2006)

    Google Scholar 

  2. M. Doulcier-Verdier, D. Jean-Max, F. Jacquesm et al., Aside-channel and fault-attack resistant AES circuit working on duplicated complemented values. ISSCC Digest of Technical Papers (2011), pp. 274–275

    Google Scholar 

  3. A. Moradi, A. Poschmann, S. Ling, C. Paar, H. Wang, Pushing the limits: a very compact and a threshold implementation of AES’. Adv. Cryptol. EUROCRYPT 69–88 (2011)

    Google Scholar 

  4. M. Kar, A. Singh, M. Sanu et al., Improved power-side-channelattack resistance of an AES-128 core via a security-aware integrated buck voltage regulator. ISSCC Digest of Technical Papers (2017), pp. 141–142

    Google Scholar 

  5. W. Shan, X. Fu, Z. Xu, A secure reconfigurable crypto IC with countermeasures against SPA, DPA and EMA. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 34 (7), 1201–1205 (2015)

    Google Scholar 

  6. W. Shan; S. Zhang; Y. He, Machine learning-based side-channel-attack countermeasure with hamming-distance redistribution and its application on advanced encryption standard. Electron. Lett. 53(14), 7 6 (2017)

    Google Scholar 

  7. D.A. Silva, E.B. Pereira, E.G. Nepomuceno, Implementation of the logistic map with FPGA using 32 bits fixed point standard. in XIII SimposioBrasileiro de AutomacaoInteligente—SBAI2017, Porto Alegre, Brazil. In Portugues, Fri, 11 Aug (2017)

    Google Scholar 

  8. A. Pande, J. Zambreno, Design and hardware ımplementation of a chaotic encryption scheme for real-time embedded systems. in An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map, Security and CommunicationNetworks (2018)

    Google Scholar 

  9. M. Zhao, G. Edward Suh, FPGA-based remote power side-channel attacks. in 2018 IEEE Symposium on Security and Privacy (2018)

    Google Scholar 

  10. A. Srivastava, P. Ghosh, An efficient memory zeroization technique under side-channel attacks. in 32nd International Conference on VLSI Design (2019)

    Google Scholar 

  11. A. Singh, N. Chawla, J.-H. Ko, Energy efficient and side-channel secure cryptographic hardware for IoT-edge nodes. IEEE Internet of Things J. 6(1), (2019)

    Google Scholar 

  12. http://www.eng.usf.edu/cvprg/Mammography/Database.html

  13. https://csrc.nist.gov/projects/random-bit-generation/documentation-and-software

  14. B. Illuri, D. Jose, Design and implementation of hybrid integration of cognitive learning and chaotic countermeasures for side channel attacks. J. Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02030-x

    Article  Google Scholar 

  15. https://www.cs.waikato.ac.nz/ml/weka/

  16. L. Punitha, K.N. Devi, D. Jose, J. Sundararajan, Design of double edge-triggered flip-flop for low-power educational environment. Int. J. Electri. Eng. Educ. 2-s2.0–85070403539 (2019)

    Google Scholar 

  17. M. Baskar, T. Gnanasekaran, Developing efficient intrusion tracking system using region based traffic impact measure towards the denial of service attack mitigation. 14(7), 3576–3582 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepa Jose .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Illuri, B., Jose, D., David, S., Nagarjuan, M. (2022). Machine Learning Based and Reconfigurable Architecture with a Countermeasure for Side Channel Attacks. In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-5529-6_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-5528-9

  • Online ISBN: 978-981-16-5529-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics