Title :
Random clock against differential power analysis
Author :
Boey, Kean Hong ; Lu, Yingxi ; Neill, Maire O. ; Woods, Roger
Author_Institution :
Inst. of Electron., Commun. & Inf. Technol. (ECIT), Queen´´s Univ. Belfast, Belfast, UK
Abstract :
Cryptographic systems are being compromised by power analysis attacks. In this paper, a novel countermeasure technique against power analysis attacks is proposed which dynamically varies the clock when executing operations (making it difficult to correlate power traces in the time domain) and inserts dummy operations during idling clock cycles (reducing the signal-to-noise ratio of the useful information). Its effectiveness is shown by performing a DPA attack on basic, intermediate (random clock) and advanced (random clock and dummy data) designs for the AES encryption algorithm, implemented on a FPGA-based board. The intermediate design is resistant to classical DPA attacks and the advanced design reduces the SNR by 79% (increasing area by 70% and reducing performance by 5.33%) when compared to the basic design. It is shown that the design is better in both metrics than other countermeasure techniques.
Keywords :
clocks; cryptography; field programmable gate arrays; logic design; AES encryption algorithm; DPA attack; FPGA-based board; countermeasure technique; cryptographic systems; differential power analysis; dummy operations; idling clock cycles; power analysis attacks; power traces; random clock; signal-to-noise ratio; time domain; Clocks; Correlation; Delay; Encryption; Field programmable gate arrays; Resistance; Cryptography; Power analysis; Random Clock;
Conference_Titel :
Circuits and Systems (APCCAS), 2010 IEEE Asia Pacific Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4244-7454-7
DOI :
10.1109/APCCAS.2010.5774887