unrolled cryptography on silicon a physical security
play

Unrolled Cryptography on Silicon A Physical Security Analysis - PowerPoint PPT Presentation

RUHR-UNIVERSITT BOCHUM Unrolled Cryptography on Silicon A Physical Security Analysis Thorben Moos Ruhr University Bochum, Horst Grtz Institute for IT Security, Germany September 15th, 2020 Section 1 Introduction Thorben Moos | Unrolled


  1. RUHR-UNIVERSITÄT BOCHUM Unrolled Cryptography on Silicon A Physical Security Analysis Thorben Moos Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany September 15th, 2020

  2. Section 1 Introduction Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 1

  3. RUHR-UNIVERSITÄT BOCHUM Target Introduction Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 2

  4. RUHR-UNIVERSITÄT BOCHUM Background Introduction • Cryptographic primitives with high-speed (low-latency) performance in hardware have received growing attention in the last decade • This design goal requires a short critical path as a fully-unrolled combinatorial circuit without memory elements • PRINCE has been developed for high-speed single-cycle encryption and decryption at moderate hardware cost • Tempting for many different applications, e.g., memory encryption Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 3

  5. RUHR-UNIVERSITÄT BOCHUM PRINCE Introduction PRINCE core k ′ k 0 0 RC 0 RC 1 RC 2 RC 3 RC 4 RC 5 RC 6 RC 7 RC 8 RC 9 RC 10 RC 11 R 0 R 1 R 2 R 3 R 4 R 5 R -1 R -1 R -1 R -1 R -1 R -1 SR -1 M ′ SR 6 7 8 9 10 11 k 1 RC i RC i k 1 M -1 S -1 S M Source: TikZ for Cryptographers, https://www.iacr.org/authors/tikz, Author Jérémy Jean Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 4

  6. RUHR-UNIVERSITÄT BOCHUM Motivation 1 Introduction • Unrolled circuits are hard to protect against SCA attacks • Glitch-resistant masking is arguably the most relevant class of SCA countermeasures for hardware circuits • It can not easily be applied to unrolled circuits as it requires registers as synchronization stages • Generic low-latency masking [1] causes an exponential increase in the circuit size when trying to avoid register stages • However, it has been reported that the high parallelism, asynchronicity and speed of execution of unrolled circuits create an inherent resistance to side-channel attacks Source: [1] Gross et al., Generic Low-Latency Masking in Hardware, TCHES Volume 2018 Issue 2 Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 5

  7. RUHR-UNIVERSITÄT BOCHUM Motivation 2 Introduction • Previous works on the physical security of unrolled PRINCE are all FPGA-based • According to [2] an FPGA implementation occupies about 35 × as much area, consumes about 14 × as much dynamic power and is more than 4 × slower than an equivalent standard-cell-based ASIC design • Hard to transfer conclusions from one platform to the other • Static leakage of unrolled circuits has not been considered as a threat to such implementations yet Source: [2] Kuon et al., Measuring the Gap Between FPGAs and ASICs, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2007 Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 6

  8. RUHR-UNIVERSITÄT BOCHUM Gate-Level Simulations Introduction • 9 169 logic gates corresponding to 10 036 (GE), synthesized for 200 MHz • 114 803 gate transitions (avg) for random plaintext and key transition, 96% glitches • 56 920 gate transitions (avg) for random plaintext transition, 92% glitches Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 7

  9. Section 2 Experimental Results Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 8

  10. RUHR-UNIVERSITÄT BOCHUM No Reset Dynamic Power Analysis 1 Power cons. 0 -1 0 100 200 300 400 500 600 Time samples 0.12 0.1 Correlation Correlation 0.1 0.05 0.08 0 0 100 200 300 400 500 600 1 2 3 4 5 Time samples Number of measurements 10 5 Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 9

  11. RUHR-UNIVERSITÄT BOCHUM Plaintext Reset to Zero Dynamic Power Analysis 1 200 Power cons. t-statistics 100 0 0 -1 0 100 200 300 400 500 600 0 100 200 300 400 500 600 Time samples Time samples Frequ. of occur. 200 fixed 200 t-statistics random 100 100 0 0 0 50 100 150 200 250 300 0 2000 4000 6000 8000 10000 Power consumption Number of measurements Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 10

  12. RUHR-UNIVERSITÄT BOCHUM Plaintext and Key Reset to Zero Dynamic Power Analysis 1 Power cons. 0 t-statistics 0 -20 -1 -40 -2 -60 0 100 200 300 400 500 600 0 100 200 300 400 500 600 Time samples Time samples Frequ. of occur. fixed 60 200 t-statistics random 40 100 20 0 0 0 50 100 150 0 2000 4000 6000 8000 10000 Power consumption Number of measurements Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 11

  13. RUHR-UNIVERSITÄT BOCHUM Plaintext Reset to Random Value Dynamic Power Analysis 1 Power cons. 20 t-statistics 0 10 0 -1 0 100 200 300 400 500 600 0 100 200 300 400 500 600 Time samples Time samples Frequ. of occur. fixed 80 20 t-statistics random 60 40 10 20 0 0 0 50 100 150 200 250 300 0 2000 4000 6000 8000 10000 Power consumption Number of measurements Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 12

  14. RUHR-UNIVERSITÄT BOCHUM Plaintext and Key Reset to Random Value Dynamic Power Analysis 1 Power cons. 20 t-statistics 0 10 -1 0 -2 0 100 200 300 400 500 600 0 100 200 300 400 500 600 Time samples Time samples Frequ. of occur. fixed 20 t-statistics 100 random 50 10 0 0 0 50 100 150 200 250 300 0 2000 4000 6000 8000 10000 Power consumption Number of measurements Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 13

  15. RUHR-UNIVERSITÄT BOCHUM Plaintext and Key Reset to Random Value Dynamic Power Analysis Reset Type Attack Best Power Model Found Rec. Nib. HD(S( p i − 1, j ⊕ ˆ k j ), S( p i , j ⊕ ˆ no reset CPA k j )) 16/16 HD(S(0 ⊕ ˆ k j ), S( p i , j ⊕ ˆ plain zero CPA k j )) 7/16 HD(S(0 ⊕ 0), S( p i , j ⊕ ˆ plain and key zero CPA k j )) 5/16 HW(S( p i , j ⊕ ˆ plain random CPA k j )) 2/16 HW(S( p i , j ⊕ ˆ plain and key random CPA k j )) 3/16 Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 14

  16. RUHR-UNIVERSITÄT BOCHUM Signal-to-Noise-Ratio (SNR) Dynamic Power Analysis 0.4 0.3 0.04 SNR SNR 0.2 0.02 0.1 0 0 2 4 6 8 10 12 2 4 6 8 10 12 Round Round 0.003 0.02 0.002 SNR SNR 0.01 0.001 0 0 2 4 6 8 10 12 2 4 6 8 10 12 Round Round Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 15

  17. RUHR-UNIVERSITÄT BOCHUM Static Power Results Static Power Analysis Frequ. of occur. 100 fixed 200 t-statistics random 50 100 0 0 0 50 100 150 200 250 300 0 2000 4000 6000 8000 10000 Power consumption Number of measurements Correlation Correlation 0.04 0.04 0.02 0.02 0 0 1 2 3 4 5 1 2 3 4 5 10 5 10 5 Number of measurements Number of measurements Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 16

  18. RUHR-UNIVERSITÄT BOCHUM Static Power Results Static Power Analysis Round Attack Best Power Model Found Rec. Nib. LSB(S( p i , j ⊕ ˆ k j )) first CPA 15/16 LSB(S( c i , j ⊕ ˆ last CPA k ′ j )) 16/16 Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 17

  19. RUHR-UNIVERSITÄT BOCHUM Signal-to-Noise-Ratio (SNR) Static Power Analysis static 0.03 dynamic 0.02 SNR 0.01 0 2 4 6 8 10 12 Round Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 18

  20. RUHR-UNIVERSITÄT BOCHUM Conclusion • Protecting unrolled circuits without causing severe area or latency penalties is hard • Some simple usage principles deliver promising results • Resetting the plaintext input of an unrolled cipher to a random value between encryptions makes is effective against information leakage through the dynamic power • Static power adversaries can remain dangerous in such a scenario if clock control is an option or if other mistakes are made • Due to its nature the static power consumption is often the easiest way to extract the full 128-bit key of unrolled PRINCE because each round can be targeted with the same effort Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 19

  21. Thank you for your attention. Any questions? Thorben Moos | Unrolled Cryptography on Silicon | September 15th, 2020 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend