A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES

Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel informa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Arora, Ankita, Ambrose, Jude Angelo, Peddersen, Jorgen, Parameswaran, Sri
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 83
container_issue
container_start_page 76
container_title
container_volume
creator Arora, Ankita
Ambrose, Jude Angelo
Peddersen, Jorgen
Parameswaran, Sri
description Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel information (execution time, power variations, electro migration, sound, etc.). Power analysis attack is most prevalent out of all Side Channel Attacks (SCAs), the popular being the Differential Power Analysis (DPA). Balancing of signal transitions is one of the methods by which a countermeasure is implemented. Existing balancing solutions to counter power analysis attacks are either costly in terms of power and area or involve much complexity, hence lacks practicality. This paper for the first time proposes a double-width single core (earlier methods used two separate cores)processor algorithmic balancing to obfuscate power variations resulting in a DPA resistant system. The countermeasure only includes code/algorithmic modifications, hence can be easily deployed in any embedded system with a 16 bits bitwidth (or wider) processor. A DPA attack is demonstrated on the Double Width Single Core (DWSC) solution. The attack proved unsuccessful in finding the correct secret key. The instruction memory size overhead is only 16.6% while data memory increases by 15.8%.
doi_str_mv 10.1109/ISVLSI.2013.6654626
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6654626</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6654626</ieee_id><sourcerecordid>6654626</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-960af74ec4fe14629b27579506ab72bbf23e2226779c689ad4f9a7d737c634963</originalsourceid><addsrcrecordid>eNo9kM1Kw0AURkdRsNY-QTfzAqnzl7mdZShVAwUXKS7clJvkphlNJyUZLX17BYur76wOnI-xuRQLKYV7zIu3TZEvlJB6YW1qrLJX7F4acE5qLe01myiZukQbgJt_tu6OzcbxQwghAVKzhAl7z3jdf5UdJSdfx5Zjt-8HH9uDr3iJHYbKhz2PPT8O9E0h8mN_ooFjwO48-pEXvia-ajEE6ngWI1afI_eBZ-vigd022I00u-yUbZ_W29VLsnl9zlfZJvFOxMRZgQ0YqkxD8jfElQpScKmwWIIqy0ZpUkpZAFfZpcPaNA6hBg2V1cZZPWXzP60not1x8AcczrvLK_oHhO5USQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Arora, Ankita ; Ambrose, Jude Angelo ; Peddersen, Jorgen ; Parameswaran, Sri</creator><creatorcontrib>Arora, Ankita ; Ambrose, Jude Angelo ; Peddersen, Jorgen ; Parameswaran, Sri</creatorcontrib><description>Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel information (execution time, power variations, electro migration, sound, etc.). Power analysis attack is most prevalent out of all Side Channel Attacks (SCAs), the popular being the Differential Power Analysis (DPA). Balancing of signal transitions is one of the methods by which a countermeasure is implemented. Existing balancing solutions to counter power analysis attacks are either costly in terms of power and area or involve much complexity, hence lacks practicality. This paper for the first time proposes a double-width single core (earlier methods used two separate cores)processor algorithmic balancing to obfuscate power variations resulting in a DPA resistant system. The countermeasure only includes code/algorithmic modifications, hence can be easily deployed in any embedded system with a 16 bits bitwidth (or wider) processor. A DPA attack is demonstrated on the Double Width Single Core (DWSC) solution. The attack proved unsuccessful in finding the correct secret key. The instruction memory size overhead is only 16.6% while data memory increases by 15.8%.</description><identifier>ISSN: 2159-3469</identifier><identifier>EISSN: 2159-3477</identifier><identifier>EISBN: 1479913316</identifier><identifier>EISBN: 9781479913312</identifier><identifier>DOI: 10.1109/ISVLSI.2013.6654626</identifier><language>eng</language><publisher>IEEE</publisher><subject>Algorithm design and analysis ; Embedded systems ; Encryption ; Hardware</subject><ispartof>2013 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2013, p.76-83</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6654626$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6654626$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Arora, Ankita</creatorcontrib><creatorcontrib>Ambrose, Jude Angelo</creatorcontrib><creatorcontrib>Peddersen, Jorgen</creatorcontrib><creatorcontrib>Parameswaran, Sri</creatorcontrib><title>A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES</title><title>2013 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</title><addtitle>ISVLSI</addtitle><description>Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel information (execution time, power variations, electro migration, sound, etc.). Power analysis attack is most prevalent out of all Side Channel Attacks (SCAs), the popular being the Differential Power Analysis (DPA). Balancing of signal transitions is one of the methods by which a countermeasure is implemented. Existing balancing solutions to counter power analysis attacks are either costly in terms of power and area or involve much complexity, hence lacks practicality. This paper for the first time proposes a double-width single core (earlier methods used two separate cores)processor algorithmic balancing to obfuscate power variations resulting in a DPA resistant system. The countermeasure only includes code/algorithmic modifications, hence can be easily deployed in any embedded system with a 16 bits bitwidth (or wider) processor. A DPA attack is demonstrated on the Double Width Single Core (DWSC) solution. The attack proved unsuccessful in finding the correct secret key. The instruction memory size overhead is only 16.6% while data memory increases by 15.8%.</description><subject>Algorithm design and analysis</subject><subject>Embedded systems</subject><subject>Encryption</subject><subject>Hardware</subject><issn>2159-3469</issn><issn>2159-3477</issn><isbn>1479913316</isbn><isbn>9781479913312</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kM1Kw0AURkdRsNY-QTfzAqnzl7mdZShVAwUXKS7clJvkphlNJyUZLX17BYur76wOnI-xuRQLKYV7zIu3TZEvlJB6YW1qrLJX7F4acE5qLe01myiZukQbgJt_tu6OzcbxQwghAVKzhAl7z3jdf5UdJSdfx5Zjt-8HH9uDr3iJHYbKhz2PPT8O9E0h8mN_ooFjwO48-pEXvia-ajEE6ngWI1afI_eBZ-vigd022I00u-yUbZ_W29VLsnl9zlfZJvFOxMRZgQ0YqkxD8jfElQpScKmwWIIqy0ZpUkpZAFfZpcPaNA6hBg2V1cZZPWXzP60not1x8AcczrvLK_oHhO5USQ</recordid><startdate>201308</startdate><enddate>201308</enddate><creator>Arora, Ankita</creator><creator>Ambrose, Jude Angelo</creator><creator>Peddersen, Jorgen</creator><creator>Parameswaran, Sri</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201308</creationdate><title>A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES</title><author>Arora, Ankita ; Ambrose, Jude Angelo ; Peddersen, Jorgen ; Parameswaran, Sri</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-960af74ec4fe14629b27579506ab72bbf23e2226779c689ad4f9a7d737c634963</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Algorithm design and analysis</topic><topic>Embedded systems</topic><topic>Encryption</topic><topic>Hardware</topic><toplevel>online_resources</toplevel><creatorcontrib>Arora, Ankita</creatorcontrib><creatorcontrib>Ambrose, Jude Angelo</creatorcontrib><creatorcontrib>Peddersen, Jorgen</creatorcontrib><creatorcontrib>Parameswaran, Sri</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Arora, Ankita</au><au>Ambrose, Jude Angelo</au><au>Peddersen, Jorgen</au><au>Parameswaran, Sri</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES</atitle><btitle>2013 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</btitle><stitle>ISVLSI</stitle><date>2013-08</date><risdate>2013</risdate><spage>76</spage><epage>83</epage><pages>76-83</pages><issn>2159-3469</issn><eissn>2159-3477</eissn><eisbn>1479913316</eisbn><eisbn>9781479913312</eisbn><abstract>Advanced Encryption Standard (AES) is one of the most widely used cryptographic algorithms in embedded systems, and is deployed in smart cards, mobile phones and wireless applications. Researchers have found various techniques to attack the encrypted data or the secret key using Side Channel information (execution time, power variations, electro migration, sound, etc.). Power analysis attack is most prevalent out of all Side Channel Attacks (SCAs), the popular being the Differential Power Analysis (DPA). Balancing of signal transitions is one of the methods by which a countermeasure is implemented. Existing balancing solutions to counter power analysis attacks are either costly in terms of power and area or involve much complexity, hence lacks practicality. This paper for the first time proposes a double-width single core (earlier methods used two separate cores)processor algorithmic balancing to obfuscate power variations resulting in a DPA resistant system. The countermeasure only includes code/algorithmic modifications, hence can be easily deployed in any embedded system with a 16 bits bitwidth (or wider) processor. A DPA attack is demonstrated on the Double Width Single Core (DWSC) solution. The attack proved unsuccessful in finding the correct secret key. The instruction memory size overhead is only 16.6% while data memory increases by 15.8%.</abstract><pub>IEEE</pub><doi>10.1109/ISVLSI.2013.6654626</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2159-3469
ispartof 2013 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2013, p.76-83
issn 2159-3469
2159-3477
language eng
recordid cdi_ieee_primary_6654626
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Algorithm design and analysis
Embedded systems
Encryption
Hardware
title A double-width algorithmic balancing to prevent power analysis Side Channel Attacks in AES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T12%3A30%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20double-width%20algorithmic%20balancing%20to%20prevent%20power%20analysis%20Side%20Channel%20Attacks%20in%20AES&rft.btitle=2013%20IEEE%20Computer%20Society%20Annual%20Symposium%20on%20VLSI%20(ISVLSI)&rft.au=Arora,%20Ankita&rft.date=2013-08&rft.spage=76&rft.epage=83&rft.pages=76-83&rft.issn=2159-3469&rft.eissn=2159-3477&rft_id=info:doi/10.1109/ISVLSI.2013.6654626&rft_dat=%3Cieee_6IE%3E6654626%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1479913316&rft.eisbn_list=9781479913312&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6654626&rfr_iscdi=true