concealing secrets in embedded processor designs
play

Concealing Secrets in Embedded Processor Designs A B C Z - PowerPoint PPT Presentation

0 Concealing Secrets in Embedded Processor Designs A B C Z Hannes Gross , Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, and Mario Werner Institute for Applied Information Processing and Communications Graz University of


  1. 0 Concealing Secrets in Embedded Processor Designs … A B C Z Hannes Gross , Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, and Mario Werner Institute for Applied Information Processing and Communications Graz University of Technology D O M 0 Concealing Secrets in Embedded Processor Designs

  2. This work in one slide… 1 1 o V-scale processor (RISC-V) A + B o Domain-Oriented Masking = Z C o SCA protected V-scale d + 1 o arbitrary protection level o flexible and updateable o transparent to software designers o open source: https://github.com/hgrosz/vscale_dom D O M 1 Concealing Secrets in Embedded Processor Designs

  3. This work in numbers… 2 2 1 st -Order 2 nd -order Unprotected LUTs 1 2.6 k 4.1 k 5.6 k + 57% + 37% registers 1 1.0 k 1.8 k 2.5 k + 80% + 39% random bits 0 64 192 3� ∗ ��� � �� pipeline stages 3 4 4 1) for Xilinx Kintex-7 FPGA D O M 2 Concealing Secrets in Embedded Processor Designs

  4. Motivation 3 3 Masking is…  very effective SCA countermeasure  cumbersome traces  error prone  requires expertise  lots of evaluation work �  for specific implementations  decomposition of complex functions  slows down the implementation D O M 3 Concealing Secrets in Embedded Processor Designs

  5. Boolean Masking from Different Perspectives 4 4 Masking Sharing � � � � � � � � � � � ⋯ � � � � � � � � � � … Boolean masking D O M 4 Concealing Secrets in Embedded Processor Designs

  6. Domain-Oriented Masking 5 5 � CIRCUIT CIRCUIT � � (insecure) (insecure) … D O M 5 Concealing Secrets in Embedded Processor Designs

  7. Domain-Oriented Masking 6 6 � ← ���2 � � � � � � ← ���2 � � � � � … D O M 6 Concealing Secrets in Embedded Processor Designs

  8. Domain-Oriented Masking 7 7 Domain A � � , � � , … � � � � , � � , … � � � CIRCUIT CIRCUIT Domain B � � � , � � , … � � � � , � � , … � � (insecure) (insecure) … � � 1 domains D O M 7 Concealing Secrets in Embedded Processor Designs

  9. Linear Operations 8 8 � � � � � � Domain A … � � � � � � Domain B … D O M 8 Concealing Secrets in Embedded Processor Designs

  10. Nonlinear Operations 9 9 � � � � Domain A Z Domain B � � � �` � � � � � � D O M 9 Concealing Secrets in Embedded Processor Designs

  11. Protecting Arbitrary Circuits 10 10 transform CIRCUIT CIRCUIT (insecure) (insecure) D O M 10 Concealing Secrets in Embedded Processor Designs

  12. �� -Order Secure AND Gate 11 11 � � � � � � � … DOM-indep DOM-indep � � � � Multiplier Multiplier … � � … 1. Calculation 2. Resharing 3. Integration D O M 11 Concealing Secrets in Embedded Processor Designs

  13. 1. Calculation 12 12 � � �� � �� � �� � � � � � ⋯ ��� � �� � � � � � ⋯ � D O M 12 Concealing Secrets in Embedded Processor Designs

  14. 1. Calculation 13 13 � � �� � �� � �� � � � � � ⋯ ��� � �� � � � � � ⋯ � D O M 13 Concealing Secrets in Embedded Processor Designs

  15. 2. Resharing 14 14 � � � � � �� � � � � � � � � �� � � � � � � � � ⋯ �� � � � � � � � � � � � � � �� � � � � � � � � ⋯ �� � � � � � � � � �� � � � � � � � � � � � � � ⋯ D O M 14 Concealing Secrets in Embedded Processor Designs

  16. 2. Resharing 15 15 � � � � � �� � � � � � � � � �� � � � � � � � � ⋯ �� � � � � � � � � � � � � � �� � � � � � � � � ⋯ �� � � � � � � � � �� � � � � � � � � � � � � � ⋯ D O M 15 Concealing Secrets in Embedded Processor Designs

  17. 3. Integration 16 16 � � � � � �� � � � � � � � � �� � � � � � � � � ⋯ �� � � � � � � � � � � � � � �� � � � � � � � � ⋯ �� � � � � � � � � �� � � � � � � � � � � � � � ⋯ D O M 16 Concealing Secrets in Embedded Processor Designs

  18. RISC-V ISA 17 17 o free and open RISC ISA o register sizes 32, 64 or 128 bit o only base integer instructions (I, E) mandatory o lots of extensions o multiplication/division (M) o atomic operations (A) o single- (F) and double-precision (D) floating point ops o compressed instructions (C) o extensions (X) o no flags D O M 17 Concealing Secrets in Embedded Processor Designs

  19. V-scale Processor 18 18 o RV32IM instruction set o 32 x 32-bit registers o single-issue in-order 3-stage pipeline o combined decode & execute stage o write back stage with bypass functionality o AHB-Lite interface  either Harvard or von Neumann o open source https://github.com/ucb-bar/vscale/ D O M 18 Concealing Secrets in Embedded Processor Designs

  20. DOM Protected V-scale Processor 19 19 o High-level overview of changes o Protected (shared) parts  “I” instructions  data memory interface  register file o Unprotected parts  “M” instructions  instruction memory  instruction decoder  program counter D O M 19 Concealing Secrets in Embedded Processor Designs

  21. DOM Protected V-scale Processor 20 20 D O M 20 Concealing Secrets in Embedded Processor Designs

  22. Protected ALU 21 21 • Linear functions • Shifts • XOR • Nonlinear functions • AND (OR) • Adder • Two fresh random Z’s D O M 21 Concealing Secrets in Embedded Processor Designs

  23. Protected Adder 22 22 • Kogge-Stone Adder • Calculation split into “generate” and “propagate” • Logarithmic runtime (init. + 5 steps + postproc.) • Two Z shares D O M 22 Concealing Secrets in Embedded Processor Designs

  24. 23 Concealing Secrets in Embedded Processor Designs Results M O D 23 23

  25. Required Randomness 24 24 640 576 512 448 384 random bits 320 256 192 128 64 0 0 1 2 3 4 protection order � D O M 24 Concealing Secrets in Embedded Processor Designs

  26. Influence on the Maximum Clock 25 25 60 50 40 f clk [MHz] 30 20 10 0 0 1 2 3 4 protection order � D O M 25 Concealing Secrets in Embedded Processor Designs

  27. T-test – 1. Collect Traces for Constant Input 26 26 0x0001020304… DOM R V-Scale A D O M 26 Concealing Secrets in Embedded Processor Designs

  28. T-test – 2. Collect Traces for Constant Input 27 27 0x??????????… DOM R V-Scale B D O M 27 Concealing Secrets in Embedded Processor Designs

  29. T-test – 3. Calculate “t” Value 28 28 Null hypothesis: both trace sets have equal mean � � � � � � � |�| � � � � � Pass criterion |t| < 4.5 for |�| > 99.999% confidence otherwise fail D O M 28 Concealing Secrets in Embedded Processor Designs

  30. T-test – Result 29 29 D O M 29 Concealing Secrets in Embedded Processor Designs

  31. Conclusions 30 30 • SCA resistant RISC-V processor • DOM for arbitrary protection level  Advantages • more flexible • transparent for SW designers • inherently a lot of noise • faster development of secure systems • faster than SW based masking D O M 30 Concealing Secrets in Embedded Processor Designs

  32. Conclusions 31 31  Drawbacks • requires a lot of randomness • slower than dedicated HW solutions • does not seal all leakages sources D O M 31 Concealing Secrets in Embedded Processor Designs

  33. 32 Concealing Secrets in Embedded Processor Designs The HECTOR project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644052. This work was partially supported by the TU Graz LEAD project "Dependable Internet of Things in Adverse Environments". This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No 681402). Hannes Gross , Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, and Mario Werner Institute for Applied Information Processing and Communications Graz University of Technology D O M 32 Concealing Secrets in Embedded Processor Designs

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend