A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC

  • Colin O’Flynn
  • Zhizhang Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7743)

Abstract

When capturing power measurements for processing with side-channel analysis, there are many options with regards to both how the measurement is taken, and also how that measurement is digitized. This work concentrates on a new technique which measures the current through a decoupling capacitor, with a probe that can easily be built in any electronics lab. In addition an open-source digitizer board is presented, which is specifically designed to measure the signals required for side-channel analysis. The techniques presented in this work facilitate sharing of repeatable measurement techniques: the measurement environment presented can easily be duplicated at a very low cost.

Keywords

side-channel analysis decoupling acquisition case study 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  2. 2.
    Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Standaert, F.-X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411–425. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  6. 6.
    Jun, B., Kenworthy, G.: Is your mobile device radiating keys? In: RSA Conference 2012 (2012)Google Scholar
  7. 7.
    De Mulder, E.: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices. PhD thesis, KU Leuven (2010)Google Scholar
  8. 8.
    Mateos, E., Gebotys, C.: Side channel analysis using giant magneto-resistive (gmr) sensors. In: International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE (2011)Google Scholar
  9. 9.
    Duc, G., Guilley, S., Sauvage, L., Flament, F., Nassar, M., Selmane, N., Danger, J.L., Graba, T., Mathieu, Y., Renaud, P.: Results of the 2009-2010 ”dpa contest v2”. In: International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE (February 2011)Google Scholar
  10. 10.
    Carluccio, D.: Electromagnetic Side Channel Analysis of Embedded Crypto Devices. PhD thesis, Ruhr University Bochum (2005)Google Scholar
  11. 11.
    Souissi, Y., Danger, J., Guilley, S., Bhasin, S., Nassar, M.: Embedded systems security: An evaluation methodology against side channel attacks. In: 2011 Conference on Design and Architectures for Signal and Image Processing (DASIP), pp. 1–8. IEEE (2011)Google Scholar
  12. 12.
    Agilent Technologies: Triggering Wide-Bandwidth Sampling Oscilloscopes for Accurate Displays of High-Speed Digital Communications Waveforms (2005)Google Scholar
  13. 13.
    O’Flynn, C.: Openadc (2012), http://www.newae.com/openadc
  14. 14.
    Smith, D.: Signal and noise measurement techniques using magnetic field probes. In: 1999 IEEE International Symposium on Electromagnetic Compatibility, vol. 1, pp. 559–563. IEEE (1999)Google Scholar
  15. 15.
    Katashita, T., Satoh, A., Kikuchi, K., Nakagawa, H., Aoyagi, M.: Evaluation of dpa characteristics of sasebo for board level simulations. In: International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), pp. 36–39 (2010)Google Scholar
  16. 16.
    Danis, A., Ors, B.: Differential power analysis attack considering decoupling capacitance effect. In: European Conference on Circuit Theory and Design, ECCTD 2009, pp. 359–362. IEEE (2009)Google Scholar
  17. 17.
    Faraday, M.: Experimental researches in electricity. Phil. Trans. R. Soc. Lond. 122, 125–162 (1832)Google Scholar
  18. 18.
    Weaver, J., Horowitz, M.: Measurement of via currents in printed circuit boards using inductive loops. In: 2006 IEEE Electrical Performance of Electronic Packaging, pp. 37–40. IEEE (2006)Google Scholar
  19. 19.
    Weaver, J., Horowitz, M.: Measurement of supply pin current distributions in integrated circuit packages. In: 2007 IEEE Electrical Performance of Electronic Packaging, pp. 7–10. IEEE (2007)Google Scholar
  20. 20.
    Li, L., Kim, J., Wang, H., Wu, S., Takita, Y., Takeuchi, H., Araki, K., Fan, J.: Measurement of multiple switching current components through a bulk decoupling capacitor using a lab-made low-cost current probe. In: 2011 IEEE International Symposium on Electromagnetic Compatibility (EMC), pp. 417–421. IEEE (2011)Google Scholar
  21. 21.
    Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-Enhanced Power Analysis Collision Attack. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 125–139. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  22. 22.
    Satoh, A.: Side-channel attack standard evaluation board (sasebo) - dpa contest (2011), http://www.morita-tech.co.jp/SASEBO/en/index.html
  23. 23.
    Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443–461. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  24. 24.
    Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203–220. Springer, Heidelberg (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Colin O’Flynn
    • 1
  • Zhizhang Chen
    • 1
  1. 1.Dalhousie UniversityHalifaxCanada

Personalised recommendations