Efficiency of a Combined Protection Method against Correlation

  • Horia-Nicolai L. Teodorescu Technical Univ. Gh Asachi Iasi, Romania Romanian Academy
  • Emanuel-Florin Iftene "Gheorghe Asachi" Technical University of Iasi Romania, Iasi, 8 Bd. Carol I,

Abstract

We analyze the eciency of the masking of instruction patterns using a chaotic driven clock and power supply, in front of a side attack intruding the power supply of a microsystem. The differential analysis is supposedly conducted by correlation power analysis. We demonstrate that the use of a chaotically-driven masking based on relatively simple circuits may be a signicant candidate for the protection of embedded systems.

References

[1] P. Kocher, J. Jae, B. Jun, (1998), Introduction to Dierential Power Analysis and Related Attacks, Cryptography Research Inc, www.cryptography.com/public/pdf/DPATechInfo.pdf. Accessed Jan. 2012.

[2] P. Kocher, J. Jae, B. Jun, (2000), Dierential Power Analysis, Cryptography Research Inc, www.cryptography.com/public/pdf/DPA.pdf. Accessed Jan. 2012.

[3] V. Tiwari, S. Malik, A. Wolfe, M. T.-C.Lee, Instruction Level Power Analysis and Optimiza- tion of Software. J. VLSI Signal Processing, Vol. 13, No. 2-3, Aug. 1996, pp. 223-238.
http://dx.doi.org/10.1007/BF01130407

[4] R. Newell, F. Juliano, Protecting Sensitive Networked Embedded Systems from Aggressive Intrusion. EDN, Electronic Design News Magazine, May 5, 2013. www.edn.com/Pdf/ViewPdf?contentItemId=4413418

[5] T.-H. Le, M. Berthier, Mutual Information Analysis under the View of Higher-Order Statis- tics. In: Echizen, I., Kunihiro, N., Sasaki, R., (Eds.), Advances in Information and Computer Security, LNCS Vol. 6434, 2010, pp. 285-300, Springer, Berlin Heidelberg, pp. 285-300
http://dx.doi.org/10.1007/978-3-642-16825-3_19

[6] H.-N. L. Teodorescu, E.-F. Iftene, Analysis of the Code Masking Eciency of Chaotic Clocks in Microcontroller Applications, Proc. ISEEE 2010, pp. 261-266.

[7] E.-F. Iftene, H.-N. L. Teodorescu, Masking the Instructions of a Microcontroller using a `Chaotic' Power Supply, Bull. Polytechnic Inst. Iasi, E&E, LIX (LXIII), 1, 2013, pp. 21-28.

[8] E.-F. Iftene, H.-N. L. Teodorescu, Protecting the Code against Side Attacks using Chaotically Controlled Clock and Supply. Proc. ECAI 2013 - 5th Int. Conf. Electronics, Computers and A.I., IEEE Conf. #20924, 27-29 June 2013, Pitesti, Romania, pp. 79-82.

[9] H.-N.L. Teodorescu, V. P. Cojocaru, Complex Signal Generators based on Capacitors and on Piezoelectric Loads. In: C. H. Skiadas, I. Dimotikalis and C. Skiadas (Eds), Chaos Theory: Modeling, Simulation and Applications. 2011, World Scientic Publishing Co., pp. 423-430.

[10] E. Brier, C. Clavier, F. Olivier, Correlation Power Analysis with a Leakage Model. In M. Joye and J.J. Quisquater (Eds.), Cryptographic Hardware Embedded System, CHES 2004, Vol. 3156, LNCS, pp. 16-29, Springer-Verlag, 2004.

[11] Y. Zhang, A. Juels, M.K. Reiter, T. Ristenpart, Cross-VM Side Channels and Their Use to Extract Private Keys. ACM, 2012.
http://dx.doi.org/10.1145/2382196.2382230.


[12] R.E. Atani, S. Mirzakuchaki, S.E. Atani, W. Meier, On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles, International Journal of Computers Communications & Control, ISSN 1841-9836, Vol. 3 (4), pp. 324-335, 2008.
Published
2014-01-03
How to Cite
TEODORESCU, Horia-Nicolai L.; IFTENE, Emanuel-Florin. Efficiency of a Combined Protection Method against Correlation. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 9, n. 1, p. 79-84, jan. 2014. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/572>. Date accessed: 07 july 2020. doi: https://doi.org/10.15837/ijccc.2014.1.572.

Keywords

physical security; protection, hardware; side attack; chaos; control signal; security evaluation