a formal study of power variability issues and side
play

A Formal Study of Power Variability Issues and Side-Channel Attacks - PowerPoint PPT Presentation

A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices Mathieu Renauld, Fran cois-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel, Denis Flandre. May 2011 UCL Crypto Group Cryptopuces - May 2011


  1. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices Mathieu Renauld, Fran¸ cois-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel, Denis Flandre. May 2011 UCL Crypto Group Cryptopuces - May 2011 1 Microelectronics Laboratory

  2. Outline Introduction Scaling trends - variability Motivation Framework - MI Perceived Information Template + variability Results Conclusion UCL Crypto Group Cryptopuces - May 2011 2 Microelectronics Laboratory

  3. Outline Introduction Scaling trends - variability Motivation Framework - MI Perceived Information Template + variability Results Conclusion UCL Crypto Group Cryptopuces - May 2011 3 Microelectronics Laboratory

  4. Electronic devices are everywhere... And may contain sensitive data. RFID tags Sensor networks Smartcards UCL Crypto Group Cryptopuces - May 2011 4 Microelectronics Laboratory

  5. Introduction K Adversary Cryptographic P C algorithm Classical cryptanalysis UCL Crypto Group Cryptopuces - May 2011 5 Microelectronics Laboratory

  6. Introduction K Adversary Cryptographic P C algorithm Implementation Physical leakage Side-Channel cryptanalysis UCL Crypto Group Cryptopuces - May 2011 5 Microelectronics Laboratory

  7. Block ciphers UCL Crypto Group Cryptopuces - May 2011 6 Microelectronics Laboratory

  8. Example of attacks Numerous side-channel attacks. ◮ Non-profiled attacks: DPA, CPA, ... ◮ Profiled attacks: template attacks, stochastic models, ... Divide-and-conquer strategy. L k ⊕ y x P S UCL Crypto Group Cryptopuces - May 2011 7 Microelectronics Laboratory

  9. Example of attack : template attack Univariate template attack. 1. Profiling phase. ◮ Measurements on a training device. The attacker determines the plaintexts and keys. ◮ Assumption: Gaussian noise. ◮ Building templates N ( l | ˆ σ 2 µ x , ˆ x ) (= pdf). ˆ σ x ˆ µ x UCL Crypto Group Cryptopuces - May 2011 8 Microelectronics Laboratory

  10. Example of attack : template attack 2. Attack phase. ◮ Measurements on the target device ⇒ { p i , l i } . ◮ Compute Pr[ k ∗ | l , p ] ∀ k ∗ . l 1 l 2 ◮ Choose ˜ k such that ˜ Pr[ k ∗ | l , p ]. k = arg max k ∗ UCL Crypto Group Cryptopuces - May 2011 9 Microelectronics Laboratory

  11. Outline Introduction Scaling trends - variability Motivation Framework - MI Perceived Information Template + variability Results Conclusion UCL Crypto Group Cryptopuces - May 2011 10 Microelectronics Laboratory

  12. Motivation General trend in electronics: scaling down the circuit size. ◮ Logic styles are more difficult to balance ◮ Non-linearity increases ◮ Variability UCL Crypto Group Cryptopuces - May 2011 11 Microelectronics Laboratory

  13. Motivation Classical assumption: Chip production unit UCL Crypto Group Cryptopuces - May 2011 12 Microelectronics Laboratory

  14. Motivation Classical assumption: User Chip production Attack! unit Adversary UCL Crypto Group Cryptopuces - May 2011 12 Microelectronics Laboratory

  15. Motivation With variability: User Chip production ??? unit Adversary UCL Crypto Group Cryptopuces - May 2011 12 Microelectronics Laboratory

  16. Background: framework How do we fairly evaluate the security of an implementation? Example: Adversary A breaks implementation I 1 in 10 power traces and breaks implementation I 2 in 10.000 power traces. Is I 2 1000 times more secure than I 1 , or is A not adapted to break I 2 ? UCL Crypto Group Cryptopuces - May 2011 13 Microelectronics Laboratory

  17. Background: framework F.-X. Standaert, T.G. Malkin and M. Yung presented A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks at Eurocrypt 2009. Concept: separating the evaluation of the implementation from the evaluation of the adversary. ◮ Implementation → information theoretic metric (MI). ◮ Adversary → security metric (succes rate according to the number of traces). UCL Crypto Group Cryptopuces - May 2011 14 Microelectronics Laboratory

  18. Background: framework Information theoretic metric MI( X ; L ): how much the uncertainty on X is reduced by knowing L . MI( X ; L ) = H[ X ] − H[ X | L ] � � = H[ X ] − Pr[ l ] Pr[ x | l ] log 2 Pr[ x | l ] l ∈L x ∈X � � = H[ X ] − Pr[ l ]Pr[ x | l ] log 2 Pr[ x | l ] l ∈L x ∈X Bayes: Pr[ x | l ]Pr[ l ] = Pr[ l | x ]Pr[ x ] � � = H[ X ] − Pr[ x ]Pr[ l | x ] log 2 Pr[ x | l ] l ∈L x ∈X � � = H[ X ] − Pr[ x ] Pr[ l | x ] log 2 Pr[ x | l ] x ∈X l ∈L UCL Crypto Group Cryptopuces - May 2011 15 Microelectronics Laboratory

  19. Perceived information � � Pr chip [ l | x ] log 2 ˆ MI( X ; L ) = H[ X ] − Pr model [ x | l ] Pr[ x ] x ∈X l ∈L Interpretation: ◮ Pr chip [ l | x ] are the pdf from the actual chip. ˆ Pr model [ x | l ] are the estimated pdf from the adversary’s ◮ model. Are those pdf the same? UCL Crypto Group Cryptopuces - May 2011 16 Microelectronics Laboratory

  20. Perceived information - AES Sbox in 65 nm Perfect profiling phase ˆ Pr model = Pr chip l ∈L Pr chip [ l | x ] log 2 ˆ MI( X ; L ) = H[ X ] − � x ∈X Pr[ x ] � Pr model [ x | l ] Mutual information = IT metric. UCL Crypto Group Cryptopuces - May 2011 17 Microelectronics Laboratory

  21. Perceived information - AES Sbox in 65 nm Bounded profiling phase Variability Simpler model ˆ Pr model = Pr chip l ∈L Pr chip [ l | x ] log 2 ˆ MI( X ; L ) = H[ X ] − � x ∈X Pr[ x ] � Pr model [ x | l ] PI Perceived information = informal measure. UCL Crypto Group Cryptopuces - May 2011 17 Microelectronics Laboratory

  22. Templates in presence of variability In 65nm: impossible to produce 2 exactly identical chips. → profiling on a different chip. σ chip 2 , x σ chip 1 , x µ chip 2 , x µ chip 1 , x UCL Crypto Group Cryptopuces - May 2011 18 Microelectronics Laboratory

  23. Templates in presence of variability In 65nm: impossible to produce 2 exactly identical chips. → profiling on several chips. σ chip 1 , x µ chip 2 , x µ chip 1 , x µ chip 4 , x µ chip 3 , x µ chip 5 , x UCL Crypto Group Cryptopuces - May 2011 18 Microelectronics Laboratory

  24. Templates in presence of variability In 65nm: impossible to produce 2 exactly identical chips. → profiling on several chips. ˆ σ model , x ˆ µ model , x UCL Crypto Group Cryptopuces - May 2011 18 Microelectronics Laboratory

  25. Templates in presence of variability In 65nm: impossible to produce 2 exactly identical chips. → profiling on several chips. � σ 2 σ 2 ˆ model , x + ˆ noise , x ˆ µ model , x UCL Crypto Group Cryptopuces - May 2011 18 Microelectronics Laboratory

  26. Results Perceived information UCL Crypto Group Cryptopuces - May 2011 19 Microelectronics Laboratory

  27. Results Data complexity UCL Crypto Group Cryptopuces - May 2011 20 Microelectronics Laboratory

  28. Model soundness Model soundness: the asymptotic success rate of a Bayesian adversary exploiting it in order to recover a target value is 1. Here: target value = transition. ˆ � Pr chip [ l | s ] log 2 ˆ ˆ Pr model [ s ∗ | l ] , = − H s , s ∗ l ∈L ˆ ˆ ˆ  h 1 , 1 h 1 , 2 h 1 , |S|  ... ˆ ˆ ˆ h 2 , 2 h 2 , 2 h 2 , |S| ...   =  ,   ... ... ... ...  ˆ ˆ ˆ h |S| , 1 h |S| , 2 h |S| , |S| ... UCL Crypto Group Cryptopuces - May 2011 21 Microelectronics Laboratory

  29. Model soundness UCL Crypto Group Cryptopuces - May 2011 22 Microelectronics Laboratory

  30. Results Success rate for non-profiled attacks UCL Crypto Group Cryptopuces - May 2011 23 Microelectronics Laboratory

  31. Outline Introduction Scaling trends - variability Motivation Framework - MI Perceived Information Template + variability Results Conclusion UCL Crypto Group Cryptopuces - May 2011 24 Microelectronics Laboratory

  32. Conclusions ◮ Important to take variability into account. ◮ Perceived information is a useful informal metric when the adversary is not optimal. ◮ HW leakage model is not always relevant. UCL Crypto Group Cryptopuces - May 2011 25 Microelectronics Laboratory

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend