DocumentCode
3228968
Title
Random clock against differential power analysis
Author
Boey, Kean Hong ; Lu, Yingxi ; Neill, Maire O. ; Woods, Roger
Author_Institution
Inst. of Electron., Commun. & Inf. Technol. (ECIT), Queen´´s Univ. Belfast, Belfast, UK
fYear
2010
fDate
6-9 Dec. 2010
Firstpage
756
Lastpage
759
Abstract
Cryptographic systems are being compromised by power analysis attacks. In this paper, a novel countermeasure technique against power analysis attacks is proposed which dynamically varies the clock when executing operations (making it difficult to correlate power traces in the time domain) and inserts dummy operations during idling clock cycles (reducing the signal-to-noise ratio of the useful information). Its effectiveness is shown by performing a DPA attack on basic, intermediate (random clock) and advanced (random clock and dummy data) designs for the AES encryption algorithm, implemented on a FPGA-based board. The intermediate design is resistant to classical DPA attacks and the advanced design reduces the SNR by 79% (increasing area by 70% and reducing performance by 5.33%) when compared to the basic design. It is shown that the design is better in both metrics than other countermeasure techniques.
Keywords
clocks; cryptography; field programmable gate arrays; logic design; AES encryption algorithm; DPA attack; FPGA-based board; countermeasure technique; cryptographic systems; differential power analysis; dummy operations; idling clock cycles; power analysis attacks; power traces; random clock; signal-to-noise ratio; time domain; Clocks; Correlation; Delay; Encryption; Field programmable gate arrays; Resistance; Cryptography; Power analysis; Random Clock;
fLanguage
English
Publisher
ieee
Conference_Titel
Circuits and Systems (APCCAS), 2010 IEEE Asia Pacific Conference on
Conference_Location
Kuala Lumpur
Print_ISBN
978-1-4244-7454-7
Type
conf
DOI
10.1109/APCCAS.2010.5774887
Filename
5774887
Link To Document