Abstract
Side-channel attacks (SCAs) are among the major threats to embedded systems’ security, where implementation characteristics of cryptographic algorithms are exploited to extract secret parameters. The most common SCAs take advantage of electromagnetic (EM) leakage or power consumption recorded during device operation by placing an EM probe over the chip or measuring the voltage drop across an internal resistor, respectively. In this work, two SCA countermeasures are presented which address these two types of leakage vectors. The first countermeasure supports implementation diversity and moving target defense, while the second one generates random algorithmic noise. These concepts are implemented using the dynamic partial reconfiguration (DPR) feature of modern FPGA devices. Both of the countermeasures are easily scalable, and the effect of scalability on the area overhead and security strength is presented. We evaluate our design by measuring EM emanations from a state-of-the-art System-on-Chip (SoC) with 16 nm production technology. With the most secure variant, we are able to increase the resistance against Correlation Power Analysis (CPA) by a factor of 95 compared to an unprotected AES implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44709-1_21
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_2
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9
Bow, I., et al.: Side-channel power resistance for encryption algorithms using implementation diversity. Cryptography 4(2), 13 (2020)
Hettwer, B., Petersen, J., Gehrer, S., Neumann, H., Güneysu, T.: Securing cryptographic circuits by exploiting implementation diversity and partial reconfiguration on FPGAs. In: Design, Automation Test in Europe Conference Exhibition (DATE), Florence, Italy, vol. 2019, pp. 260–263 (2019). https://doi.org/10.23919/DATE.2019.8714801
Xilinx, Partial Reconfiguration Controller v1.3, LogiCORE IP Product Guide, Xilinx, April 2018, vivado Design Suite PG193
Xilinx, Vivado Design Suite User Guide: Partial Reconfiguration, Xilinx, 27 April 2018
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks. Springer, Boston (2007). https://doi.org/10.1007/978-0-387-38162-6
Mentens, N.: Hiding side-channel leakage through hardware randomization: a comprehensive overview. In: 2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS), Pythagorion, pp. 269–272 (2017). https://doi.org/10.1109/SAMOS.2017.8344639
Nguyen, T.T., Thevenin, M., Mouraud, A., Corre, G., Pasquier, O., Pillement, S.: High-level reliability evaluation of reconfiguration-based fault tolerance techniques. In: IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW). Vancouver, BC, vol. 2018, pp. 202–205 (2018). https://doi.org/10.1109/IPDPSW.2018.00038
Reorda, M.S., Sterpone, L., Ullah, A.: An error-detection and self-repairing method for dynamically and partially reconfigurable systems. IEEE Trans. Comput. 66(6), 1022–1033 (2017). https://doi.org/10.1109/TC.2016.2607749
Mentens, N., Gierlichs, B., Verbauwhede, I.: Power and fault analysis resistance in hardware through dynamic reconfiguration. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 346–362. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85053-3_22
Güneysu, T., Moradi, A.: Generic side-channel countermeasures for reconfigurable devices. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 33–48. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_3
Sasdrich, P., Moradi, A., Mischke, O., Güneysu, T.: Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST). Washington, DC, pp. 130–136 (2015). https://doi.org/10.1109/HST.2015.7140251
O’Flynn, C., Chen, Z.: A case study of side-channel analysis using decoupling capacitor power measurement with the OpenADC. In: Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (eds.) FPS 2012. LNCS, vol. 7743, pp. 341–356. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37119-6_22
Canright, D.: A very compact Rijndael S-box, September 2004. https://www.researchgate.net/publication/235155631_A_Very_Compact_Rijndael_S-box
Villar, J.C.: Opencores 128/192 AES. Accessed 16 Mar 2019. https://opencores.org/projects/systemcaes
Liu, G.: Gaussian Noise Generator (GNG) Verilog IP Core. Accessed 16 Mar 2019. https://github.com/liuguangxi/gng
Lal, V.: LFSR-Random number generator. Accessed 16 Mar 2019. https://opencores.org/projects/lfsr_randgen
verilog code for SINE PWM. Accessed 16 Mar 2019. https://community.intel.com/t5/Intel-Quartus-Prime-Software/verilog-code-for-SINE-PWM/td-p/144210
Simple sine wave generator in VHDL. Accessed 16 Mar 2019. https://vhdlguru.blogspot.com/2010/03/simple-sine-wave-generator-in-vhdl.html
Chami, C.A.: Pseudo random generator Tutorial. Accessed 16 Mar 2019. https://fpgasite.wordpress.com/2016/08/09/pseudo-random-generator-tutorial/
Pseudo random number generator Tutorial. Accessed 16 Mar 2019. http://fpgasite.blogspot.com/2017/04/pseudo-random-generator-tutorial.html
Sasdrich, P., Moradi, A., Güneysu, T.: Hiding higher-order side-channel leakage. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 131–146. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52153-4_8
Acknowledgements
This work was supported by the German Federal Ministry of Education and Research (BMBF) under Grant 16KIS0610.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Khan, N., Hettwer, B., Becker, J. (2021). Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks. In: Derrien, S., Hannig, F., Diniz, P.C., Chillet, D. (eds) Applied Reconfigurable Computing. Architectures, Tools, and Applications. ARC 2021. Lecture Notes in Computer Science(), vol 12700. Springer, Cham. https://doi.org/10.1007/978-3-030-79025-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-79025-7_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79024-0
Online ISBN: 978-3-030-79025-7
eBook Packages: Computer ScienceComputer Science (R0)