Loading...
Please wait, while we are loading the content...
Similar Documents
A Methodology For Optimized Design Of Secure Differential Logic Gates For DPA Resistant Circuits
| Content Provider | Semantic Scholar |
|---|---|
| Author | Sekhar, Chellu Chandra |
| Copyright Year | 2015 |
| Abstract | In the modern world secure data transfer and privacy is becoming a major problem. Smart cards and other embedded devices use an encryption technology for secure data transfer. If a person want to obtain the secret data that is encrypted within these cards he can obtain it by measuring the power supply current of such device while it is performing an encryption and carefully analyzing it mathematically. In this paper a new technology is presented to increase the security by at least two orders of magnitude and with negligible performance degradation. It is accomplished by redistributing the charge stored in internal nodes and thus, removing memory effects that represent a significant threat to security. The first attack on smart cards has been reported in 1999 and since then various researches are going on how to implement a secure data transfer. In this paper a novel complete methodology for removing internal charges in any gate of any differential logic style is discussed. It is proving suitability for secure implementation designing and simulating different digital gates. A method for performing simulation based DPA attacks on the substitution box of the Kasumi algorithm to assess the proposal is also explained. The paper also discussed about the effect of temperature variations on the security of the proposal against DPA attacks. Keywords-Differential Power Analysis (DPA), Homogeneous Dual-Rail Logic (HDRL), Power Consumption, Side-Channel Attacks I.Introduction Security is an important concern in the present life scenario. Cryptographic cores are used to protect various devices but their physical implementation can be compromised by observing dynamic circuit emanations in order to derive information about the secrets it conceals. Protection against these attacks, also called side channel attacks are major concern of the cryptographic community.A cryptographic system in operation can be monitored and the traces of measured parameter values can be examined by an attacker to discover the secret key ofthe system. Such attacks are termed as side channel attacks. Among all forms of side channel attacks, the power monitoring attacks so called Differential Power Attacks (DPA) are the most prominent threat to the cryptographic systems since power traces of operations can be easily obtained. Those power traces can be mathematically analyzed to reveal the secret keys quite easily. In general, power dissipation of a circuit is proportional to its switching activity which, in turn, depends on the data that is being handled. The data dependent power consumption can be exploited to leak away the secret information, specifically, distribution of 0's and 1's. DPA involves collecting large number of power traces and performing statistical analysis of the power variation with respect to changes in data values to extract the secret key. Thus, an attacker can obtain the secret key by measuring the power supply current of a cryptographic device while it is performing an encryption, and by statistically analyzing of the measured power traces. Nanometric technologies with a drastic increase in leakage power are also vulnerable to similar leakage associated attacks. Volume 3, Issue 5 SEP 2015 IJOEET Since the vulnerability of cryptosystems to DPA was reported in 1999, various power analysis attacks and corresponding counter measures have been studied. The earliest methods of combating DPA, such as the incorporation of random power consuming operations and introduction of random delays, among others, proved generally to be ineffective, since they only slightly increase the number of measurements to disclose (MTDs) required to recover the secret key To maximize DPA attack prevention, numerous methods based on protecting cryptosystems at algorithm level have been presented, with some noteworthy solutions being based on duplication. However, algorithmbased security techniques are very specific and difficult to automate, due to their heavy dependence on specific cryptographic algorithm. On the other hand, circuit-level counter measures are more generic, since they are not constrained to one specific cryptographic algorithm. Once a practical method has been found, designers need worry no more about the security of implementations for a specific algorithm, and this make automatic design feasible. This type of solution falls into two categories: gate level mask circuits and complementary circuits. One example of gate level masking is Random Switching Logic (RSL) in which a random signal is used to equalize output transition probability. The main disadvantage of this procedure is its strict timing concern. The other level called complementary level is also named as hiding techniques, is the implementation of a logic circuit with power consumption theoretically independent of the data being processed. The design of this kind of secure cells has been an ongoing obsession in the crypto community, thus it can be used for the hardware implementation of any kind of cryptographic algorithm for either public-key or private-key cryptosystems, regardless of the specific application. There are several approaches to creating hiding counter measures at circuit level with complementary coding and data-independent power consumption. Those based on adiabatic logic, like for instance , offer relevant low-power security features, but adiabatic designs require precise timing (at least four supplyclock phases) and still need further development. To maximize hiding effects for security purposes using more conventional logic styles, dual rail with precharge logic (DPL) families have been proposed to ensure one computation performed in every clock cycle showing exactly the same transition probability for every input condition. II.LITERATURE SURVEY In 2001, Rakers P et al developed a secure contactless smart card having no batteries. As the device power is extracted from the RF field. The transceiver adheres to the ISO 14443, type B specification. This system-on-a-chip integrates the RF circuitry with a large digital circuit without benefit of external bypass capacitors. A measured bit error rate of 3 -10 is achieved. Security is also improved as the isolation circuit increases the required time for differential power analysis (DPA) attack by a factor of 2^22. An additional loop antenna is required for this and an isolation circuit is also an essential part that prevents the coupling of digital noise into the receiver[1]. In 2002, Messerges S T et al investigated on simple power analysis and differential power analysis and reviewed the theory behind DPA attacks. His study examines how power analysis theory attacks an actual smart card [2]. The paper showed how DES algorithm gets attacked by specific multiple bits DPA attack. SNR calculation is also presented and the main drawback of this power analysis study is that it is a very elaborate study process. Since it considers only the stronger attacks and neglect the weaker attacks, this kind of methodology can't be used as a reliable one. In 2006, Monnet Y et al presented hardening techniques against fault attacks and the practical evaluation of their efficiency. The circuit technology investigated to improve the resistance against fault attacks is asynchronous logic. Fault tolerance is measured and all the errors that were actually injected into the SBOXES of the hardened DES are detected. The countermeasures are evaluated using laser beam fault injection. The proposed study has got a very large computational complexity [3]. In 2008, Muresan R et al proposed a circuit that protects smart cards against Volume 3, Issue 5 SEP 2015 IJOEET differential power analysis attacks. The circuit is based on a current flattening technique, is designed using a standard 0:18-micrometer CMOS technology, and can be integrated on the samedie or in the same package with the smart card microcontroller[4]. In 2010, Liu C P et al a DPA countermeasure circuit based on digital controlled ring oscillators is presented to efficiently resist the first-order DPA attack. The implementation of the critical S-box of the advanced encryption standard (AES) algorithm shows that the area overhead of a single S-box is about 19% without any extra delay in the critical path. Moreover, the countermeasure circuit can be mounted onto different S-box implementations based on composite field or look-up table (LUT). Based on our approach, a DPA-resistant AES chip can be proposed to maintain the same throughput with less than 2K extra gates. The main disadvantage of the proposed system is its cost is much higher and the throughput is degraded by at least 50%[5]. In 2011 Zhang Y et al, presented a novel multi-level design method to secure encryption algorithms against DPA attack. Generally, DPAresistant methods can be mainly divided into two levels: software and hardware. Software-based countermeasures are relatively cheaper to put in place, while hardware-based methods counteract DPA at a lower level and achieve better countermeasure effectiveness. Taking both the cost and the level of security into consideration, the technique of WDDL and dynamic cryptosystem are combined, and propose a comprehensive DPA countermeasure on both the algorithmic and the logic level. Hardware accelerator based higher-order masking is used here. The dynamic cryptosystem considerably increases the attack complexity, and meanwhile we utilize WDDL to balance the leakage of power. In this way, DPA attack can be effectively resisted atacceptable cost. Third-order masking design reduces 8/9 execution cycles of GPP based reference design[6]. In 2012 Tanimura K et al proposed the homogeneous dualrail logic (HDRL) standard. It is a standard cell DPA attack countermeasure that theoretically guarantees fully balanced power consumption and significantly improves DPA attack resistivity. A designer does not have to modify the original circuit at all and HDRL does not require pre-charge step. T |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.ijoeet.com/pdf15/2.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |