A First Report on Electromagnetic and Power Analysis Attacks against a 28-nm FPGA Device

نویسندگان

  • Yohei Hori
  • Toshihiro Katashita
  • Akihiko Sasaki
  • Akashi Satoh
چکیده

Two types of side-channel attack (SCA)— electromagnetic analysis (EMA) and correlation power analysis (CPA)—are conducted on the latest 28-nm field-programmable gate array (FPGA) device. SCA exploits leakage of physical information, such as power consumption or electromagnetic (EM) radiation, from a cryptographic device to extract that device’s secret key. Owing to remarkable advances in large-scale integration (LSI) technology factors such as reduced core voltages and use of on-chip capacitors, power analysis of cryptographic devices has become increasingly difficult; consequently, the threat of EMA to cryptographic devices has become the greater concern. To assess the feasibility of SCA against state-of-the-art LSI technology, we developed the Side-channel Attack Standard Evaluation Board (SASEBO)-GIII, which is equipped with Xilinx Inc.'s 28-nm Kintex-7 FPGA device. To demonstrate the suitability of SASEBO-GIII for SCA research, we performed EMA and CPA against advanced encryption standard (AES) circuits on the Kintex-7 FPGA and compared the results with those on the 65-nm Virtex-5 FPGA from our previous SASEBO-GII evaluation platform. EMA successfully extracted the entire secret key from the Kintex-7 FPGA on the SASEBOGIII with fewer wave traces than were needed for the Virtex-5 FPGA on the SASEBO-GII; furthermore, EMA against Kintex-7 FPGA required fewer wave traces than did CPA against the same device. In this paper, we explain the features of SASEBO-GIII, provide experimental EMA and CPA results, and discuss the risk posed by EMA and CPA to leading-edge LSI technology.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

Power-Analysis Attacks on an FPGA - First Experimental Results

Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular, especially for rapid prototyping. For implementations of cryptographic algorithms, not only the speed and the size of the circuit are important, but also their security against implementation attacks such as side-channel attacks. Power-analysis attacks are typical examples of side-channel attacks, that have been demonstra...

متن کامل

Power Analysis of FPGAs: How Practical is the Attack?

Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve encryption rates that sometimes may require hardware implementations. Reprogrammable devices such as Field Programmable Gate Arrays are highly attractive solutions for hardware implementations of encryption algorithms an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013