• DocumentCode
    828409
  • Title

    Masking the energy behaviour of encryption algorithms

  • Author

    Saputra, H. ; Vijaykrishnan, N. ; Kandemir, M. ; Irwin, M.J. ; Brooks, R.

  • Volume
    150
  • Issue
    5
  • fYear
    2003
  • Abstract
    Smart cards are vulnerable to both noninvasive attacks using power and timing measurements to extract the cryptographic key. The power measurement techniques rely on the data-dependent energy behaviour of the underlying system. Further, power analysis can be used to identify the specific portions of the program being executed to induce timing glitches that may in turn help to bypass key checking. Thus, it is important to mask the energy consumption when executing the encryption algorithms. The instruction set architecture of a simple five-stage pipelined smart card processor with secure instructions to mask the energy differences due to key-related data-dependent computations in DES and Rijndael encryptions is augmented. The secure versions operate on the normal and complementary versions of the operands simultaneously to mask the energy variations due to value-dependent operations. However, this incurs the penalty of increased overall energy consumption in the data-path components. Consequently, we employ secure versions of instructions only for critical operations; that is we use secure instructions selectively, as directed by an optimising compiler. Using a cycle-accurate energy simulator, the effectiveness of this enhancement is demonstrated. The approach achieves energy masking of critical operations, consuming 83% less energy compared to existing approaches employing dual rail circuits
  • Keywords
    computer crime <encryption algms., masking energy behaviour>; cryptography <encryption algms., masking energy behaviour>; optimising compilers <encryption algms., masking energy behaviour>; pipeline processing <encryption algms., masking energy behaviour>; smart cards <encryption algms., masking energy behaviour>; DES encryptions; Rijndael encryptions; bypass key checking; cryptographic key extraction; cycle-accurate energy simulator; data-dependent energy behaviour; data-path components; dual rail circuits; encryption algorithm energy behaviour; five-stage pipelined smart card processor; keyrelated data-dependent computations; noninvasive attacks; optimising compiler; power measurement techniques; power measurements; smart cards; timing glitches; timing measurements;
  • fLanguage
    English
  • Journal_Title
    Computers and Digital Techniques, IEE Proceedings -
  • Publisher
    iet
  • ISSN
    1350-2387
  • Type

    jour

  • DOI
    10.1049/ip-cdt:20030832
  • Filename
    1245596