Download presentation
Presentation is loading. Please wait.
Published byMarjorie Pierce Modified over 9 years ago
1
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R. Muresan, C. Gebotys Presentation By: Radu Muresan
2
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden2 Outline Introduction Power analysis attacks (PAAs) Definitions, examples, countermeasures Current flattening technique Definition, methodology, implementations Current flattening as a countermeasure against PAAs Results and conclusions
3
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden3 Introduction Embedded systems are increasingly used in security applications The software and the hardware components must be secure against all threats Current flattening is a potential countermeasure against PAAs Secret-key Cryptosystem: ke = kd Public – key Cryptosystem: ke ≠ kd Encryption Decryption Ciphertext Message Channel Plaintext Key Generation kd ke Key Channel
4
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden4 What is a Power Analysis Attack ? Side-channel attacks exploit correlation between secret parameters and variations in timing, power consumption, and other emanations from cryptographic devices to reveal secret keys Cryptographic Device R Current or Power Measurement Power Supply Attacker’s Point
5
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden5 Example, DPA Attack on a Scalar Multiplication Algorithm for EC Protocols DPA, uses correlation between power consumption and specific key-dependent bits kP, scalar multiplication Double-and-add approach, binary k (2) = (k n-1,...,k 0 ) kP 1,kP 2,...,kP n => C i (t) = power k n-1 = 1; After the first iteration => Q[0] = 2Pi Second iteration If k n-2 =1 => Q[1] = 4P If k n-2 =0 => Q[1] = 5P g(t)= i=1,...,k|si=1 - i=1,...,k|si=0
6
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden6 Example, DPA Attack on a Scalar Multiplication Algorithm for EC Protocols A peak is observed when 4P i are computed by the card No peak is observed when 4P i are never computed by the card Simulated correlation function between the points 4P i and power consumption C i (t) when k n-2 = 0.
7
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden7 Countermeasures Against PAAs Against timing attacks Equalizing; Randomizing; Blinding Against simple power analysis attacks Avoiding; Creating; Symmetric Against differential power analysis attacks Randomization; Blinding Hardware: non-deterministic techniques Against all PAAs Proposed: current flattening technique
8
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden8 What is Current Flattening? Current flattening targets a flat (emission free) current consumption measured at an attacker’s point of a cryptographic device Cryptographic Device Attacker’s Point Current Flattening (internal) External Current Filtering Devices
9
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden9 Behind Current Flattening Current consumption in a processor is a function of: The hardware architecture The instruction type The instruction sequencing Data manipulated Examples of current dynamics
10
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden10 Software Method Program execution is composed of two types of cycles charging; discharging Code transformations are generated for classes of instructions Current measurements used for determining code transformations Class FLATTEN0 [ALU Units] FLATTENi [ALU Units] ALU11 NOP00 CONTROL43 Example
11
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden11 Hardware Method Pipeline current flattening module
12
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden12 Hardware Method Feedback current module
13
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden13 Does Current Flattening Protect Against PAAs? Software method does not support DPA due to the fact that the program to data dependencies are not covered Hardware method has potential to cover all PAAs Supports real-time current adjustment at the clock frequency Covers both current to data and to instruction dependencies
14
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden14 Results of Software Flattening The experiments used the polymulNIST.asm implementation of an EC scalar multiplication (kP), where: P a fixed point on a known elliptic curve k a secret key Target processor: Motorola SC140 DSP Real current measurements
15
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden15 Results of Software Flattening Pk-Pk current variation reduced by 70 to 78% Energy consumption increased by 71 to 74% Execution time increased by up to 135% Ver- sion Start Time [μs] End Time [μs] Energy Prog. [μJ] Mean [mA] S [mA] Pk-Pk [mA] M125681209.90.16818.8567.7 M2251569363.20.1241.6020.3 M4251545359.90.1251.9116.8 M7251569365.50.1251.9814.3 Data analysis for software flattening
16
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden16 Results of Hardware Flattening Instantaneous current simulation for polymul.asm polymul.asm is a subroutine of polymulNIST.asm polymul.asm is a target of PAAs Target system Motorola SC140 DSP plus the Feedback Current Module Current simulation and real current measurement
17
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden17 Results of Hardware Flattening Pk-Pk current variation reduced by 94 to 97% Energy consumption increased by up to 16% Execution time increased by up to 29% Wave- form Run Time [μs] Energy [μJ] Max [mA] S [mA] Pk- Pk [mA] blue21.36.04167.72.4722.4 red21.36.14168.51.8719.2 mag.23.76.47144.00.381.2 black27.57.01134.00.130.6 Data analysis for hardware flattening
18
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden18 Conclusions The paper presented the mechanisms of the internal current flattening technique (ICF) ICF controls power consumption and current variation Countermeasure against PAAs Limitations Increased execution time and energy consumption
19
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden19 Future Work Investigate an ASIC implementation of the PAAR architecture Methods to improve the performance and energy consumption of implementations using ICF
20
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden20 References Used for the Presentation Slides 3 and 4 W. Mao, “Modern Cryptography”, Prentice Hall, 2004 O. Kommerling, M. G. Kuhn, “Design principles for tamper-resistant smartcard processors”, In Workshop on Smartcard Technology 1999 Slides 5, 6 and 7 J-S. Coron, “Resistance against dpa for elliptic curve cryptosystems”, CHES’99 P. Kocher, et al., “Differential power analysis”, In CRYPTO’99 Slide 9 R. Muresan, C. Gebotys, “Instantaneous current modeling in a complex vliw processor core”, In ACM TECS, 2004
21
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden21 THANK YOU! Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.