A First Report on Electromagnetic and Power Analysis Attacks against a 28-nm FPGA Device
نویسندگان
چکیده
Two types of side-channel attack (SCA)— electromagnetic analysis (EMA) and correlation power analysis (CPA)—are conducted on the latest 28-nm field-programmable gate array (FPGA) device. SCA exploits leakage of physical information, such as power consumption or electromagnetic (EM) radiation, from a cryptographic device to extract that device’s secret key. Owing to remarkable advances in large-scale integration (LSI) technology factors such as reduced core voltages and use of on-chip capacitors, power analysis of cryptographic devices has become increasingly difficult; consequently, the threat of EMA to cryptographic devices has become the greater concern. To assess the feasibility of SCA against state-of-the-art LSI technology, we developed the Side-channel Attack Standard Evaluation Board (SASEBO)-GIII, which is equipped with Xilinx Inc.'s 28-nm Kintex-7 FPGA device. To demonstrate the suitability of SASEBO-GIII for SCA research, we performed EMA and CPA against advanced encryption standard (AES) circuits on the Kintex-7 FPGA and compared the results with those on the 65-nm Virtex-5 FPGA from our previous SASEBO-GII evaluation platform. EMA successfully extracted the entire secret key from the Kintex-7 FPGA on the SASEBOGIII with fewer wave traces than were needed for the Virtex-5 FPGA on the SASEBO-GII; furthermore, EMA against Kintex-7 FPGA required fewer wave traces than did CPA against the same device. In this paper, we explain the features of SASEBO-GIII, provide experimental EMA and CPA results, and discuss the risk posed by EMA and CPA to leading-edge LSI technology.
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملCPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملPower-Analysis Attacks on an FPGA - First Experimental Results
Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular, especially for rapid prototyping. For implementations of cryptographic algorithms, not only the speed and the size of the circuit are important, but also their security against implementation attacks such as side-channel attacks. Power-analysis attacks are typical examples of side-channel attacks, that have been demonstra...
متن کاملPower Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve encryption rates that sometimes may require hardware implementations. Reprogrammable devices such as Field Programmable Gate Arrays are highly attractive solutions for hardware implementations of encryption algorithms an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013