Practical Attacks on Masked Hardware
In this paper we analyze recently introduced questions for masked logic styles in general and for one such logic style called MDPL in particular. The DPA resistance of MDPL suffers significantly from a problem called early propagation, which denotes a data-dependent time of evaluation of logic cells depending on input signal-delay differences. Experiments on a prototype chip show that in case of specific MDPL modules like the analyzed AES coprocessor, early propagation does not unconditionally break the DPA resistance of MDPL. Investigations indicate that this might be due to the regular structure of the particular MDPL circuit, which is assumed to cause only relatively “small” signal delay differences. Furthermore, in this article it is shown that the recently proposed, so-called PDF-attack could not be turned into a successful practical attack in our environment. Finally, the recently raised question whether MDPL has special requirements in terms of the generation of random mask bits or not is discussed theoretically.
KeywordsDPA-Resistant Masked Logic Styles MDPL Prototype Chip Hardware AES PDF-Attack PRNG
Unable to display preview. Download preview PDF.
- 5.Lin, K.J., Fang, S.C., Yang, S.H., Lo, C.C.: Overcoming Glitches and Dissipation Timing Skews in Design of DPA-Resistant Cryptographic Hardware. In: Lauwereins, R., Madsen, J. (eds.) 2007 Design, Automation and Test in Europe Conference and Exposition (DATE 2007), Nice, France, April 16-20, 2007, pp. 1265–1270. ACM Press, New York (2007)Google Scholar
- 17.Tiri, K., Schaumont, P.: Changing the Odds against Masked Logic. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 134–146. Springer, Heidelberg (2007), http://rijndael.ece.vt.edu/schaum/papers/2006sac.pdf CrossRefGoogle Scholar