On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks

One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that op...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Iokibe, K., Amano, T., Toyota, Y.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 930
container_issue
container_start_page 925
container_title
container_volume
creator Iokibe, K.
Amano, T.
Toyota, Y.
description One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that operated an AES-128 encryption process. Two decoupling conditions were examined. Radio frequency (RF) power current was detected with a current probe that was placed on a power cable connected to SASEBO-G for the cryptographic FPGA. Traces of the RF power current were recorded repeatedly with a digital oscilloscope until 30,000 traces were acquired in each decoupling condition. The traces were analyzed statistically by using the correlation power analysis (CPA). Results of CPA show that necessary number of traces to reveal the secret key significantly increased when the RF power current was attenuated by decoupling over the dominant frequency range in spectra of the RF power current. The decoupling technique can be useful as a countermeasure of side-channel analysis attacks to cryptographic modules.
doi_str_mv 10.1109/ISEMC.2011.6038441
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6038441</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6038441</ieee_id><sourcerecordid>6038441</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ec73b2eaa923bd91a24896ea9b18d8d346c3e4035616e361ab674443df1867f93</originalsourceid><addsrcrecordid>eNpVkMtKw0AYRscbWGpeQDfzAqnzZyZzWZbS1kKlghfclcnMn3Y0TcIkFvr2ViyCq-_AgbP4CLkFNgJg5n7xPH2cjDIGMJKMayHgjCRGaRC5UkwDU-dkkEGuUwDQF_9cBpd_jr1fk6TrPhhjx6w0HAbkbVWnRWOjpx5d89VWod7QpqQuHtq-2UTbboOjs6f5mPYNDbs2Nns8YoXR1u6HaBc8pm5r6xoravveus_uhlyVtuowOe2QvM6mL5OHdLmaLybjZRpA5X2KTvEiQ2tNxgtvwGZCG4nWFKC99lxIx1EwnkuQyCXYQiohBPclaKlKw4fk7rcbEHHdxrCz8bA-vcS_ATkGVqE</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Iokibe, K. ; Amano, T. ; Toyota, Y.</creator><creatorcontrib>Iokibe, K. ; Amano, T. ; Toyota, Y.</creatorcontrib><description>One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that operated an AES-128 encryption process. Two decoupling conditions were examined. Radio frequency (RF) power current was detected with a current probe that was placed on a power cable connected to SASEBO-G for the cryptographic FPGA. Traces of the RF power current were recorded repeatedly with a digital oscilloscope until 30,000 traces were acquired in each decoupling condition. The traces were analyzed statistically by using the correlation power analysis (CPA). Results of CPA show that necessary number of traces to reveal the secret key significantly increased when the RF power current was attenuated by decoupling over the dominant frequency range in spectra of the RF power current. The decoupling technique can be useful as a countermeasure of side-channel analysis attacks to cryptographic modules.</description><identifier>ISSN: 2158-110X</identifier><identifier>ISBN: 9781457708121</identifier><identifier>ISBN: 1457708124</identifier><identifier>EISSN: 2158-1118</identifier><identifier>EISBN: 9781457708107</identifier><identifier>EISBN: 1457708108</identifier><identifier>EISBN: 9781457708114</identifier><identifier>EISBN: 1457708116</identifier><identifier>DOI: 10.1109/ISEMC.2011.6038441</identifier><language>eng</language><publisher>IEEE</publisher><subject>Capacitors ; Correlation ; Current measurement ; Encryption ; Field programmable gate arrays ; Radio frequency</subject><ispartof>2011 IEEE International Symposium on Electromagnetic Compatibility, 2011, p.925-930</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6038441$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54899</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6038441$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Iokibe, K.</creatorcontrib><creatorcontrib>Amano, T.</creatorcontrib><creatorcontrib>Toyota, Y.</creatorcontrib><title>On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks</title><title>2011 IEEE International Symposium on Electromagnetic Compatibility</title><addtitle>ISEMC</addtitle><description>One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that operated an AES-128 encryption process. Two decoupling conditions were examined. Radio frequency (RF) power current was detected with a current probe that was placed on a power cable connected to SASEBO-G for the cryptographic FPGA. Traces of the RF power current were recorded repeatedly with a digital oscilloscope until 30,000 traces were acquired in each decoupling condition. The traces were analyzed statistically by using the correlation power analysis (CPA). Results of CPA show that necessary number of traces to reveal the secret key significantly increased when the RF power current was attenuated by decoupling over the dominant frequency range in spectra of the RF power current. The decoupling technique can be useful as a countermeasure of side-channel analysis attacks to cryptographic modules.</description><subject>Capacitors</subject><subject>Correlation</subject><subject>Current measurement</subject><subject>Encryption</subject><subject>Field programmable gate arrays</subject><subject>Radio frequency</subject><issn>2158-110X</issn><issn>2158-1118</issn><isbn>9781457708121</isbn><isbn>1457708124</isbn><isbn>9781457708107</isbn><isbn>1457708108</isbn><isbn>9781457708114</isbn><isbn>1457708116</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVkMtKw0AYRscbWGpeQDfzAqnzZyZzWZbS1kKlghfclcnMn3Y0TcIkFvr2ViyCq-_AgbP4CLkFNgJg5n7xPH2cjDIGMJKMayHgjCRGaRC5UkwDU-dkkEGuUwDQF_9cBpd_jr1fk6TrPhhjx6w0HAbkbVWnRWOjpx5d89VWod7QpqQuHtq-2UTbboOjs6f5mPYNDbs2Nns8YoXR1u6HaBc8pm5r6xoravveus_uhlyVtuowOe2QvM6mL5OHdLmaLybjZRpA5X2KTvEiQ2tNxgtvwGZCG4nWFKC99lxIx1EwnkuQyCXYQiohBPclaKlKw4fk7rcbEHHdxrCz8bA-vcS_ATkGVqE</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Iokibe, K.</creator><creator>Amano, T.</creator><creator>Toyota, Y.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201108</creationdate><title>On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks</title><author>Iokibe, K. ; Amano, T. ; Toyota, Y.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ec73b2eaa923bd91a24896ea9b18d8d346c3e4035616e361ab674443df1867f93</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Capacitors</topic><topic>Correlation</topic><topic>Current measurement</topic><topic>Encryption</topic><topic>Field programmable gate arrays</topic><topic>Radio frequency</topic><toplevel>online_resources</toplevel><creatorcontrib>Iokibe, K.</creatorcontrib><creatorcontrib>Amano, T.</creatorcontrib><creatorcontrib>Toyota, Y.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Iokibe, K.</au><au>Amano, T.</au><au>Toyota, Y.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks</atitle><btitle>2011 IEEE International Symposium on Electromagnetic Compatibility</btitle><stitle>ISEMC</stitle><date>2011-08</date><risdate>2011</risdate><spage>925</spage><epage>930</epage><pages>925-930</pages><issn>2158-110X</issn><eissn>2158-1118</eissn><isbn>9781457708121</isbn><isbn>1457708124</isbn><eisbn>9781457708107</eisbn><eisbn>1457708108</eisbn><eisbn>9781457708114</eisbn><eisbn>1457708116</eisbn><abstract>One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that operated an AES-128 encryption process. Two decoupling conditions were examined. Radio frequency (RF) power current was detected with a current probe that was placed on a power cable connected to SASEBO-G for the cryptographic FPGA. Traces of the RF power current were recorded repeatedly with a digital oscilloscope until 30,000 traces were acquired in each decoupling condition. The traces were analyzed statistically by using the correlation power analysis (CPA). Results of CPA show that necessary number of traces to reveal the secret key significantly increased when the RF power current was attenuated by decoupling over the dominant frequency range in spectra of the RF power current. The decoupling technique can be useful as a countermeasure of side-channel analysis attacks to cryptographic modules.</abstract><pub>IEEE</pub><doi>10.1109/ISEMC.2011.6038441</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2158-110X
ispartof 2011 IEEE International Symposium on Electromagnetic Compatibility, 2011, p.925-930
issn 2158-110X
2158-1118
language eng
recordid cdi_ieee_primary_6038441
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Capacitors
Correlation
Current measurement
Encryption
Field programmable gate arrays
Radio frequency
title On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T05%3A00%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On-board%20decoupling%20of%20cryptographic%20FPGA%20to%20improve%20tolerance%20to%20side-channel%20attacks&rft.btitle=2011%20IEEE%20International%20Symposium%20on%20Electromagnetic%20Compatibility&rft.au=Iokibe,%20K.&rft.date=2011-08&rft.spage=925&rft.epage=930&rft.pages=925-930&rft.issn=2158-110X&rft.eissn=2158-1118&rft.isbn=9781457708121&rft.isbn_list=1457708124&rft_id=info:doi/10.1109/ISEMC.2011.6038441&rft_dat=%3Cieee_6IE%3E6038441%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457708107&rft.eisbn_list=1457708108&rft.eisbn_list=9781457708114&rft.eisbn_list=1457708116&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6038441&rfr_iscdi=true