Time- and Amplitude-Controlled Power Noise Generator against SPA Attacks for FPGA-Based IoT Devices

نویسندگان

چکیده

Power noise generation for masking power traces is a powerful countermeasure against Simple Analysis (SPA), and it has also been used Differential (DPA) or Correlation (CPA) in the case of cryptographic circuits. This technique makes use consumption generators as basic modules, which are usually based on ring oscillators when implemented FPGAs. These modules can be to generate extract digital signatures through side channel Intellectual Property (IP) protection purposes. In this paper, new generator, named Xored High Consuming Module (XHCM), proposed. XHCM improves, compared others proposals literature, amount current per LUT Experimental results show that these achieve increments range from 2.4 mA (with only 16 LUTs Artix-7 devices with density 0.75 mW/LUT using single HCM) 11.1 67 8 XHCMs, 0.83 mW/LUT). Moreover, version controlled by Pulse-Width Modulation (PWM) developed, PWM-XHCM, is, XHCM, suitable watermarking. order build countermeasures SPA attacks, multi-level (ML-XHCM) presented, capable generating different levels minimal area overhead (27 six-input LUTS amplitude devices). Finally, randomized version, RML-XHCM, developed two True Random Number Generators (TRNGs) peaks random amplitudes at times. RML-XHCM requires less than 150 devices. Taking into account characteristics, main contributions have carried out article: first, PWM-XHCM provide an efficient generator extracting channel, other hand, ML-XHCM tools processing units attacks IoT

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AntibIoTic: Protecting IoT Devices Against DDoS Attacks

The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware in...

متن کامل

FPGA Implementations of the AES Masked Against Power Analysis Attacks

Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. Masking is a particularly appealing countermeasure against such attacks since it increases the security to a well quantifiable level and can be implemented without modifying the underlying technology. Its main drawback is the performance overhead it implies. For example, due to prohibitive memory ...

متن کامل

Power analysis attacks against FPGA implementation of KLEIN

KLEIN is a family of block ciphers proposed by Zheng Gong et al. at RFIDSec 2011, and its lightweight features are suitable for resource-constrained devices. However, the original design of KLEIN does not consider the potential attacks by power analysis methods. This paper presents power analysis attacks against a FPGA implementation of KLEIN by the authors of KLEIN. The attacking strategy, att...

متن کامل

Power Analysis Attacks Against FPGA Implementations of the DES

Cryptosystem designers frequently assume that secret parameters will be manipulated in tamper resistant environments. However, physical implementations can be extremely difficult to control and may result in the unintended leakage of side-channel information. In power analysis attacks, it is assumed that the power consumption is correlated to the data that is being processed. An attacker may th...

متن کامل

The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks

Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing. There are many attack results using algebraic properties and side channel information against stream ciphers for hardware applications. Al-Hinai et al. presen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Low Power Electronics and Applications

سال: 2022

ISSN: ['2079-9268']

DOI: https://doi.org/10.3390/jlpea12030048