Advertisement

An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers

  • Shohreh Sharif Mansouri
  • Elena Dubrova
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7275)

Abstract

Feedback Shift Register (FSR) based stream ciphers are known to be vulnerable to power analysis attacks due to their simple hardware structure. In this paper, we propose a countermeasure against non-invasive power analysis attacks based on switching activity masking. Our solution has a 50% smaller power overhead on average compared to the previous standard cell-based countermeasures. Its resistance against different types of attacks is evaluated on the example of Grain-80 stream cipher.

Keywords

Stream Cipher Switching Activity Side Channel Attack Physical Unclonable Function Power Trace 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Robshaw, M.: The eSTREAM Project. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 1–6. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  2. 2.
    De Cannière, C., Preneel, B.: Trivium. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 244–266. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Hell, M., Johansson, T., Maximov, A., Meier, W.: The Grain Family of Stream Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 179–190. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  4. 4.
    Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer-Verlag New York, Inc. (2007)Google Scholar
  5. 5.
    Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
  6. 6.
    Batina, L., Gierlichs, B., Prouff, E., et al.: Mutual information analysis: Comprehensive study. J. Cryptol. 24, 269–291 (2011)MathSciNetzbMATHCrossRefGoogle Scholar
  7. 7.
    Tokunaga, C., Blaauw, D.: Secure AES engine with a local switched-capacitor current equalizer. In: IEEE International Solid-State Circuits Conference - Digest of Technical Papers, ISSCC 2009 (2009)Google Scholar
  8. 8.
    Burman, S., Mukhopadhyay, D., Veezhinathan, K.: LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 384–392. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  9. 9.
    Ratanpal, G., Williams, R., Blalock, T.: An on-chip signal suppression countermeasure to power analysis attacks. IEEE Transactions on Dependable and Secure Computing, 179–189 (2004)Google Scholar
  10. 10.
    Mansouri, S.S., Dubrova, E.: A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers. In: ACM Great Lakes Symposium on VLSI, pp. 235–240 (2011)Google Scholar
  11. 11.
    Atani, S., Atani, R.E., Mirzakuchaki, S., et al.: On DPA-resistive implementation of fsr-based stream ciphers using sabl logic styles. International Journal of Computers, Communications & Control (2008)Google Scholar
  12. 12.
    Bucci, M., Giancane, L., Luzzi, R., Trifiletti, A.: Three-Phase Dual-Rail Pre-charge Logic. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 232–241. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Moradi, A., Khatir, M., Salmasizadeh, M., et al.: Charge recovery logic as a side channel attack countermeasure. In: ISQED 2009 (2009)Google Scholar
  14. 14.
    Hell, M., Johansson, T., Maximov, A., et al.: A Stream Cipher Proposal: Grain-128. In: 2006 IEEE International Symposium on Information Theory, pp. 1614–1618 (2006)Google Scholar
  15. 15.
    Skorobogatov, S.P.: Semi-invasive attacks – a new approach to hardware security analysis. University of Cambridge, Computer Laboratory, Tech. Rep. UCAM-CL-TR-630 (April 2005)Google Scholar
  16. 16.
    Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis - A Generic Side-Channel Distinguisher. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426–442. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  17. 17.
    Anderson, R., Bond, M., et al.: Cryptographic processors-a survey. Proceedings of the IEEE 94, 357–369 (2006)CrossRefGoogle Scholar
  18. 18.
    Sadeghi, A.-R., Naccache, D.: Towards Hardware-Intrinsic Security: Foundations and Practice, 1st edn. Springer-Verlag New York, Inc. (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Shohreh Sharif Mansouri
    • 1
  • Elena Dubrova
    • 1
  1. 1.Department of Electronic Systems, School of ICTKTH - Royal Institute of TechnologyStockholmSweden

Personalised recommendations