Affiliation:
1. Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50010, USA
Abstract
Over the past decade, significant research has been performed on power side-channel mitigation techniques. Logic families based on secret sharing schemes, such as t-private logic, that serve to secure cryptographic implementations against power side-channel attacks represent one such countermeasure. These mitigation techniques are applicable at various design abstraction levels—algorithm, architecture, logic, physical, and gate levels. One research question is when can the two mitigation techniques from different design abstraction levels be employed together gainfully? We explore this notion of the orthogonality of two mitigation techniques with respect to the RNS secure logic, a logic level power side-channel mitigation technique, and power distribution network (PDN), with the decoupling capacitance, a mitigation technique at physical level. Machine learning (ML) algorithms are employed to measure the effectiveness of power side-channel attacks in terms of the success rate of the adversary. The RNS protected LED block cipher round function is implemented as the test circuit in both tree-style and grid-style PDN using the FreePDK 45 nm technology library. The results show that the success rate of an unsecured base design 68.96% for naive Bayes, 67.44% with linear discriminant analysis, 67.51% for quadratic discriminant analysis, and 66.58% for support vector machine. It is reduced to a success rate of 19.68% for naive Bayes, 19.62% with linear discriminant analysis, 19.10% for quadratic discriminant analysis, and 10.54% in support vector machine. Grid-type PDN shows a slightly better reduction in success rate compared to the tree-style PDN.
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Reference41 articles.
1. Kocher, P.C., Jaffe, J., and Jun, B. (1999, January 15–19). Differential power analysis. Proceedings of the Advances in Cryptology-CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, CA, USA.
2. Koblitz, N. (1996, January 18–22). Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. Proceedings of the Advances in Cryptology—CRYPTO ’96, Santa Barbara, CA, USA.
3. Quisquater, J.J., and Samyde, D. (2001, January 19–21). Electromagnetic analysis (ema): Measures and counter-measures for smart cards. Proceedings of the International Conference on Research in Smart Cards, Cannes, France.
4. Batina, L., and Robshaw, M. (2014, January 23–26). Get your hands off my laptop: Physical side-channel key-extraction attacks on pcs. Proceedings of the Cryptographic Hardware and Embedded Systems—CHES 2014, Busan, Republic of Korea.
5. Zhou, Y., and Feng, D. (2023, December 02). Side-Channel Attacks: Ten Years after Its Publication and the Impacts on Cryptographic Module Security Testing. Available online: http://eprint.iacr.org/2005/388.