The search functionality is under construction.
The search functionality is under construction.

A Power Analysis Attack Countermeasure Based on Random Data Path Execution For CGRA

Wei GE, Shenghua CHEN, Benyu LIU, Min ZHU, Bo LIU

  • Full Text Views

    0

  • Cite this

Summary :

Side-channel Attack, such as simple power analysis and differential power analysis (DPA), is an efficient method to gather the key, which challenges the security of crypto chips. Side-channel Attack logs the power trace of the crypto chip and speculates the key by statistical analysis. To reduce the threat of power analysis attack, an innovative method based on random execution and register randomization is proposed in this paper. In order to enhance ability against DPA, the method disorders the correspondence between power trace and operands by scrambling the data execution sequence randomly and dynamically and randomize the data operation path to randomize the registers that store intermediate data. Experiments and verification are done on the Sakura-G FPGA platform. The results show that the key is not revealed after even 2 million power traces by adopting the proposed method and only 7.23% slices overhead and 3.4% throughput rate cost is introduced. Compared to unprotected chip, it increases more than 4000× measure to disclosure.

Publication
IEICE TRANSACTIONS on Information Vol.E103-D No.5 pp.1013-1022
Publication Date
2020/05/01
Publicized
2020/02/10
Online ISSN
1745-1361
DOI
10.1587/transinf.2019EDP7308
Type of Manuscript
PAPER
Category
Computer System

Authors

Wei GE
  Southeast University
Shenghua CHEN
  Southeast University
Benyu LIU
  Southeast University
Min ZHU
  Tsinghua University
Bo LIU
  Southeast University

Keyword