On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks
One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that op...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 930 |
---|---|
container_issue | |
container_start_page | 925 |
container_title | |
container_volume | |
creator | Iokibe, K. Amano, T. Toyota, Y. |
description | One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that operated an AES-128 encryption process. Two decoupling conditions were examined. Radio frequency (RF) power current was detected with a current probe that was placed on a power cable connected to SASEBO-G for the cryptographic FPGA. Traces of the RF power current were recorded repeatedly with a digital oscilloscope until 30,000 traces were acquired in each decoupling condition. The traces were analyzed statistically by using the correlation power analysis (CPA). Results of CPA show that necessary number of traces to reveal the secret key significantly increased when the RF power current was attenuated by decoupling over the dominant frequency range in spectra of the RF power current. The decoupling technique can be useful as a countermeasure of side-channel analysis attacks to cryptographic modules. |
doi_str_mv | 10.1109/ISEMC.2011.6038441 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6038441</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6038441</ieee_id><sourcerecordid>6038441</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ec73b2eaa923bd91a24896ea9b18d8d346c3e4035616e361ab674443df1867f93</originalsourceid><addsrcrecordid>eNpVkMtKw0AYRscbWGpeQDfzAqnzZyZzWZbS1kKlghfclcnMn3Y0TcIkFvr2ViyCq-_AgbP4CLkFNgJg5n7xPH2cjDIGMJKMayHgjCRGaRC5UkwDU-dkkEGuUwDQF_9cBpd_jr1fk6TrPhhjx6w0HAbkbVWnRWOjpx5d89VWod7QpqQuHtq-2UTbboOjs6f5mPYNDbs2Nns8YoXR1u6HaBc8pm5r6xoravveus_uhlyVtuowOe2QvM6mL5OHdLmaLybjZRpA5X2KTvEiQ2tNxgtvwGZCG4nWFKC99lxIx1EwnkuQyCXYQiohBPclaKlKw4fk7rcbEHHdxrCz8bA-vcS_ATkGVqE</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Iokibe, K. ; Amano, T. ; Toyota, Y.</creator><creatorcontrib>Iokibe, K. ; Amano, T. ; Toyota, Y.</creatorcontrib><description>One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that operated an AES-128 encryption process. Two decoupling conditions were examined. Radio frequency (RF) power current was detected with a current probe that was placed on a power cable connected to SASEBO-G for the cryptographic FPGA. Traces of the RF power current were recorded repeatedly with a digital oscilloscope until 30,000 traces were acquired in each decoupling condition. The traces were analyzed statistically by using the correlation power analysis (CPA). Results of CPA show that necessary number of traces to reveal the secret key significantly increased when the RF power current was attenuated by decoupling over the dominant frequency range in spectra of the RF power current. The decoupling technique can be useful as a countermeasure of side-channel analysis attacks to cryptographic modules.</description><identifier>ISSN: 2158-110X</identifier><identifier>ISBN: 9781457708121</identifier><identifier>ISBN: 1457708124</identifier><identifier>EISSN: 2158-1118</identifier><identifier>EISBN: 9781457708107</identifier><identifier>EISBN: 1457708108</identifier><identifier>EISBN: 9781457708114</identifier><identifier>EISBN: 1457708116</identifier><identifier>DOI: 10.1109/ISEMC.2011.6038441</identifier><language>eng</language><publisher>IEEE</publisher><subject>Capacitors ; Correlation ; Current measurement ; Encryption ; Field programmable gate arrays ; Radio frequency</subject><ispartof>2011 IEEE International Symposium on Electromagnetic Compatibility, 2011, p.925-930</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6038441$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54899</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6038441$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Iokibe, K.</creatorcontrib><creatorcontrib>Amano, T.</creatorcontrib><creatorcontrib>Toyota, Y.</creatorcontrib><title>On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks</title><title>2011 IEEE International Symposium on Electromagnetic Compatibility</title><addtitle>ISEMC</addtitle><description>One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that operated an AES-128 encryption process. Two decoupling conditions were examined. Radio frequency (RF) power current was detected with a current probe that was placed on a power cable connected to SASEBO-G for the cryptographic FPGA. Traces of the RF power current were recorded repeatedly with a digital oscilloscope until 30,000 traces were acquired in each decoupling condition. The traces were analyzed statistically by using the correlation power analysis (CPA). Results of CPA show that necessary number of traces to reveal the secret key significantly increased when the RF power current was attenuated by decoupling over the dominant frequency range in spectra of the RF power current. The decoupling technique can be useful as a countermeasure of side-channel analysis attacks to cryptographic modules.</description><subject>Capacitors</subject><subject>Correlation</subject><subject>Current measurement</subject><subject>Encryption</subject><subject>Field programmable gate arrays</subject><subject>Radio frequency</subject><issn>2158-110X</issn><issn>2158-1118</issn><isbn>9781457708121</isbn><isbn>1457708124</isbn><isbn>9781457708107</isbn><isbn>1457708108</isbn><isbn>9781457708114</isbn><isbn>1457708116</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVkMtKw0AYRscbWGpeQDfzAqnzZyZzWZbS1kKlghfclcnMn3Y0TcIkFvr2ViyCq-_AgbP4CLkFNgJg5n7xPH2cjDIGMJKMayHgjCRGaRC5UkwDU-dkkEGuUwDQF_9cBpd_jr1fk6TrPhhjx6w0HAbkbVWnRWOjpx5d89VWod7QpqQuHtq-2UTbboOjs6f5mPYNDbs2Nns8YoXR1u6HaBc8pm5r6xoravveus_uhlyVtuowOe2QvM6mL5OHdLmaLybjZRpA5X2KTvEiQ2tNxgtvwGZCG4nWFKC99lxIx1EwnkuQyCXYQiohBPclaKlKw4fk7rcbEHHdxrCz8bA-vcS_ATkGVqE</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Iokibe, K.</creator><creator>Amano, T.</creator><creator>Toyota, Y.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201108</creationdate><title>On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks</title><author>Iokibe, K. ; Amano, T. ; Toyota, Y.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ec73b2eaa923bd91a24896ea9b18d8d346c3e4035616e361ab674443df1867f93</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Capacitors</topic><topic>Correlation</topic><topic>Current measurement</topic><topic>Encryption</topic><topic>Field programmable gate arrays</topic><topic>Radio frequency</topic><toplevel>online_resources</toplevel><creatorcontrib>Iokibe, K.</creatorcontrib><creatorcontrib>Amano, T.</creatorcontrib><creatorcontrib>Toyota, Y.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Iokibe, K.</au><au>Amano, T.</au><au>Toyota, Y.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks</atitle><btitle>2011 IEEE International Symposium on Electromagnetic Compatibility</btitle><stitle>ISEMC</stitle><date>2011-08</date><risdate>2011</risdate><spage>925</spage><epage>930</epage><pages>925-930</pages><issn>2158-110X</issn><eissn>2158-1118</eissn><isbn>9781457708121</isbn><isbn>1457708124</isbn><eisbn>9781457708107</eisbn><eisbn>1457708108</eisbn><eisbn>9781457708114</eisbn><eisbn>1457708116</eisbn><abstract>One of PI/EMC design techniques, on-board decoupling, was proved its possibility to be used as a countermeasure against cryptographic side-channel analysis attack. The on-board decoupling was applied to a side-channel attack standard evaluation board (SASEBO-G) involving a cryptographic FPGA that operated an AES-128 encryption process. Two decoupling conditions were examined. Radio frequency (RF) power current was detected with a current probe that was placed on a power cable connected to SASEBO-G for the cryptographic FPGA. Traces of the RF power current were recorded repeatedly with a digital oscilloscope until 30,000 traces were acquired in each decoupling condition. The traces were analyzed statistically by using the correlation power analysis (CPA). Results of CPA show that necessary number of traces to reveal the secret key significantly increased when the RF power current was attenuated by decoupling over the dominant frequency range in spectra of the RF power current. The decoupling technique can be useful as a countermeasure of side-channel analysis attacks to cryptographic modules.</abstract><pub>IEEE</pub><doi>10.1109/ISEMC.2011.6038441</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2158-110X |
ispartof | 2011 IEEE International Symposium on Electromagnetic Compatibility, 2011, p.925-930 |
issn | 2158-110X 2158-1118 |
language | eng |
recordid | cdi_ieee_primary_6038441 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Capacitors Correlation Current measurement Encryption Field programmable gate arrays Radio frequency |
title | On-board decoupling of cryptographic FPGA to improve tolerance to side-channel attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T05%3A00%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On-board%20decoupling%20of%20cryptographic%20FPGA%20to%20improve%20tolerance%20to%20side-channel%20attacks&rft.btitle=2011%20IEEE%20International%20Symposium%20on%20Electromagnetic%20Compatibility&rft.au=Iokibe,%20K.&rft.date=2011-08&rft.spage=925&rft.epage=930&rft.pages=925-930&rft.issn=2158-110X&rft.eissn=2158-1118&rft.isbn=9781457708121&rft.isbn_list=1457708124&rft_id=info:doi/10.1109/ISEMC.2011.6038441&rft_dat=%3Cieee_6IE%3E6038441%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457708107&rft.eisbn_list=1457708108&rft.eisbn_list=9781457708114&rft.eisbn_list=1457708116&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6038441&rfr_iscdi=true |