A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES
Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel informa...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 83 |
---|---|
container_issue | |
container_start_page | 76 |
container_title | |
container_volume | |
creator | Arora, Ankita Ambrose, Jude Angelo Peddersen, Jorgen Parameswaran, Sri |
description | Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel information (execution time, power variations, electro migration, sound, etc.). Power analysis attack is most prevalent out of all Side Channel Attacks (SCAs), the popular being the Differential Power Analysis (DPA). Balancing of signal transitions is one of the methods by which a countermeasure is implemented. Existing balancing solutions to counter power analysis attacks are either costly in terms of power and area or involve much complexity, hence lacks practicality. This paper for the first time proposes a double-width single core (earlier methods used two separate cores)processor algorithmic balancing to obfuscate power variations resulting in a DPA resistant system. The countermeasure only includes code/algorithmic modifications, hence can be easily deployed in any embedded system with a 16 bits bitwidth (or wider) processor. A DPA attack is demonstrated on the Double Width Single Core (DWSC) solution. The attack proved unsuccessful in finding the correct secret key. The instruction memory size overhead is only 16.6% while data memory increases by 15.8%. |
doi_str_mv | 10.1109/ISVLSI.2013.6654626 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6654626</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6654626</ieee_id><sourcerecordid>6654626</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-960af74ec4fe14629b27579506ab72bbf23e2226779c689ad4f9a7d737c634963</originalsourceid><addsrcrecordid>eNo9kM1Kw0AURkdRsNY-QTfzAqnzl7mdZShVAwUXKS7clJvkphlNJyUZLX17BYur76wOnI-xuRQLKYV7zIu3TZEvlJB6YW1qrLJX7F4acE5qLe01myiZukQbgJt_tu6OzcbxQwghAVKzhAl7z3jdf5UdJSdfx5Zjt-8HH9uDr3iJHYbKhz2PPT8O9E0h8mN_ooFjwO48-pEXvia-ajEE6ngWI1afI_eBZ-vigd022I00u-yUbZ_W29VLsnl9zlfZJvFOxMRZgQ0YqkxD8jfElQpScKmwWIIqy0ZpUkpZAFfZpcPaNA6hBg2V1cZZPWXzP60not1x8AcczrvLK_oHhO5USQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Arora, Ankita ; Ambrose, Jude Angelo ; Peddersen, Jorgen ; Parameswaran, Sri</creator><creatorcontrib>Arora, Ankita ; Ambrose, Jude Angelo ; Peddersen, Jorgen ; Parameswaran, Sri</creatorcontrib><description>Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel information (execution time, power variations, electro migration, sound, etc.). Power analysis attack is most prevalent out of all Side Channel Attacks (SCAs), the popular being the Differential Power Analysis (DPA). Balancing of signal transitions is one of the methods by which a countermeasure is implemented. Existing balancing solutions to counter power analysis attacks are either costly in terms of power and area or involve much complexity, hence lacks practicality. This paper for the first time proposes a double-width single core (earlier methods used two separate cores)processor algorithmic balancing to obfuscate power variations resulting in a DPA resistant system. The countermeasure only includes code/algorithmic modifications, hence can be easily deployed in any embedded system with a 16 bits bitwidth (or wider) processor. A DPA attack is demonstrated on the Double Width Single Core (DWSC) solution. The attack proved unsuccessful in finding the correct secret key. The instruction memory size overhead is only 16.6% while data memory increases by 15.8%.</description><identifier>ISSN: 2159-3469</identifier><identifier>EISSN: 2159-3477</identifier><identifier>EISBN: 1479913316</identifier><identifier>EISBN: 9781479913312</identifier><identifier>DOI: 10.1109/ISVLSI.2013.6654626</identifier><language>eng</language><publisher>IEEE</publisher><subject>Algorithm design and analysis ; Embedded systems ; Encryption ; Hardware</subject><ispartof>2013 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2013, p.76-83</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6654626$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6654626$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Arora, Ankita</creatorcontrib><creatorcontrib>Ambrose, Jude Angelo</creatorcontrib><creatorcontrib>Peddersen, Jorgen</creatorcontrib><creatorcontrib>Parameswaran, Sri</creatorcontrib><title>A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES</title><title>2013 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</title><addtitle>ISVLSI</addtitle><description>Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel information (execution time, power variations, electro migration, sound, etc.). Power analysis attack is most prevalent out of all Side Channel Attacks (SCAs), the popular being the Differential Power Analysis (DPA). Balancing of signal transitions is one of the methods by which a countermeasure is implemented. Existing balancing solutions to counter power analysis attacks are either costly in terms of power and area or involve much complexity, hence lacks practicality. This paper for the first time proposes a double-width single core (earlier methods used two separate cores)processor algorithmic balancing to obfuscate power variations resulting in a DPA resistant system. The countermeasure only includes code/algorithmic modifications, hence can be easily deployed in any embedded system with a 16 bits bitwidth (or wider) processor. A DPA attack is demonstrated on the Double Width Single Core (DWSC) solution. The attack proved unsuccessful in finding the correct secret key. The instruction memory size overhead is only 16.6% while data memory increases by 15.8%.</description><subject>Algorithm design and analysis</subject><subject>Embedded systems</subject><subject>Encryption</subject><subject>Hardware</subject><issn>2159-3469</issn><issn>2159-3477</issn><isbn>1479913316</isbn><isbn>9781479913312</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kM1Kw0AURkdRsNY-QTfzAqnzl7mdZShVAwUXKS7clJvkphlNJyUZLX17BYur76wOnI-xuRQLKYV7zIu3TZEvlJB6YW1qrLJX7F4acE5qLe01myiZukQbgJt_tu6OzcbxQwghAVKzhAl7z3jdf5UdJSdfx5Zjt-8HH9uDr3iJHYbKhz2PPT8O9E0h8mN_ooFjwO48-pEXvia-ajEE6ngWI1afI_eBZ-vigd022I00u-yUbZ_W29VLsnl9zlfZJvFOxMRZgQ0YqkxD8jfElQpScKmwWIIqy0ZpUkpZAFfZpcPaNA6hBg2V1cZZPWXzP60not1x8AcczrvLK_oHhO5USQ</recordid><startdate>201308</startdate><enddate>201308</enddate><creator>Arora, Ankita</creator><creator>Ambrose, Jude Angelo</creator><creator>Peddersen, Jorgen</creator><creator>Parameswaran, Sri</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201308</creationdate><title>A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES</title><author>Arora, Ankita ; Ambrose, Jude Angelo ; Peddersen, Jorgen ; Parameswaran, Sri</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-960af74ec4fe14629b27579506ab72bbf23e2226779c689ad4f9a7d737c634963</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Algorithm design and analysis</topic><topic>Embedded systems</topic><topic>Encryption</topic><topic>Hardware</topic><toplevel>online_resources</toplevel><creatorcontrib>Arora, Ankita</creatorcontrib><creatorcontrib>Ambrose, Jude Angelo</creatorcontrib><creatorcontrib>Peddersen, Jorgen</creatorcontrib><creatorcontrib>Parameswaran, Sri</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Arora, Ankita</au><au>Ambrose, Jude Angelo</au><au>Peddersen, Jorgen</au><au>Parameswaran, Sri</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES</atitle><btitle>2013 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</btitle><stitle>ISVLSI</stitle><date>2013-08</date><risdate>2013</risdate><spage>76</spage><epage>83</epage><pages>76-83</pages><issn>2159-3469</issn><eissn>2159-3477</eissn><eisbn>1479913316</eisbn><eisbn>9781479913312</eisbn><abstract>Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel information (execution time, power variations, electro migration, sound, etc.). Power analysis attack is most prevalent out of all Side Channel Attacks (SCAs), the popular being the Differential Power Analysis (DPA). Balancing of signal transitions is one of the methods by which a countermeasure is implemented. Existing balancing solutions to counter power analysis attacks are either costly in terms of power and area or involve much complexity, hence lacks practicality. This paper for the first time proposes a double-width single core (earlier methods used two separate cores)processor algorithmic balancing to obfuscate power variations resulting in a DPA resistant system. The countermeasure only includes code/algorithmic modifications, hence can be easily deployed in any embedded system with a 16 bits bitwidth (or wider) processor. A DPA attack is demonstrated on the Double Width Single Core (DWSC) solution. The attack proved unsuccessful in finding the correct secret key. The instruction memory size overhead is only 16.6% while data memory increases by 15.8%.</abstract><pub>IEEE</pub><doi>10.1109/ISVLSI.2013.6654626</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2159-3469 |
ispartof | 2013 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2013, p.76-83 |
issn | 2159-3469 2159-3477 |
language | eng |
recordid | cdi_ieee_primary_6654626 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Algorithm design and analysis Embedded systems Encryption Hardware |
title | A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T12%3A30%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20double-width%20algorithmic%20balancing%20to%20prevent%20power%20analysis%20Side%20Channel%20Attacks%20in%20AES&rft.btitle=2013%20IEEE%20Computer%20Society%20Annual%20Symposium%20on%20VLSI%20(ISVLSI)&rft.au=Arora,%20Ankita&rft.date=2013-08&rft.spage=76&rft.epage=83&rft.pages=76-83&rft.issn=2159-3469&rft.eissn=2159-3477&rft_id=info:doi/10.1109/ISVLSI.2013.6654626&rft_dat=%3Cieee_6IE%3E6654626%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1479913316&rft.eisbn_list=9781479913312&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6654626&rfr_iscdi=true |