test apparatus for side channel resistance compliance
play

Test Apparatus for Side-Channel Resistance Compliance Testing - PowerPoint PPT Presentation

Institute for Applied Information Processing and Communications (IAIK) Test Apparatus for Side-Channel Resistance Compliance Testing Michael Hutter, Mario Kirschbaum, Thomas Plos, Jrn-Marc Schmidt NIAT Workshop 2011 Institute for Applied


  1. Institute for Applied Information Processing and Communications (IAIK) Test Apparatus for Side-Channel Resistance Compliance Testing Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt NIAT Workshop 2011 Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology TU Graz/Computer Science/IAIK/VLSI/Name TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 Project 1 1

  2. Institute for Applied Information Processing and Communications (IAIK) What is this talk about? � Challenge � How to quantify side-channel resistance? � How to estimate the security level? � How to perform SCA compliance testing? � Proposal � Non-invasive attack testing apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 2

  3. Institute for Applied Information Processing and Communications (IAIK) ISO/IEC 10373-6 TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 3

  4. Institute for Applied Information Processing and Communications (IAIK) The Classical SCA Setup GND 1 meas 1 GND TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 4

  5. Institute for Applied Information Processing and Communications (IAIK) The Proposed Apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 5

  6. Institute for Applied Information Processing and Communications (IAIK) What are the Advantages? 1. Reduction of noise 2. Higher measurement sensitivity TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 6

  7. Institute for Applied Information Processing and Communications (IAIK) The AT89S8253 Apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 7

  8. Institute for Applied Information Processing and Communications (IAIK) The ATmega128 Apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 8

  9. Institute for Applied Information Processing and Communications (IAIK) The GRANDESCA Apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 9

  10. Institute for Applied Information Processing and Communications (IAIK) TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 10

  11. Institute for Applied Information Processing and Communications (IAIK) TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 11

  12. Institute for Applied Information Processing and Communications (IAIK) Attack Scenarios 1. White-box evaluation � Target: MOV operation 2. Black-box evaluation � Target: 1st S-box output of an AES-128 encryption (round 1) � IC 1 : random input � IC 2 : zero input TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 12

  13. Institute for Applied Information Processing and Communications (IAIK) Results of Attacks Reference Attack Difference Attack σ = 0.96 σ = 0.67 TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 13

  14. Institute for Applied Information Processing and Communications (IAIK) AES Results TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 14

  15. Institute for Applied Information Processing and Communications (IAIK) Summary � Using two devices improves attack � Less noise � Better acquisition resolution � Can be used for � Device characterization, profiling, countermeasure evaluation, SCA-resistance tests, compliance testing, attacks, … Michael Hutter IAIK – Graz University of Technology michael.hutter@iaik.tugraz.at www.iaik.tugraz.at TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 15

  16. Institute for Applied Information Processing and Communications (IAIK) The Wheatstone Bridge TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 16

  17. Institute for Applied Information Processing and Communications (IAIK) Signal-to-Noise Ratio Reference Attack Difference Attack TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend