An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems
Hardware devices implementing cryptographic algorithms are finding their way into many applications. As this happens, the ability to keep the data being processed or stored on the device secure grows more important. Power analysis attacks involve cryptographic hardware leaking information during e...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Virginia Tech
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10919/33451 http://scholar.lib.vt.edu/theses/available/etd-06062003-163826/ |
id |
ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-33451 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-334512020-09-26T05:38:39Z An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems McDaniel, Larry T. III Electrical and Computer Engineering Martin, Thomas L. Jones, Mark T. Athanas, Peter M. DPA Data Encryption Standard SPA power analysis Hardware devices implementing cryptographic algorithms are finding their way into many applications. As this happens, the ability to keep the data being processed or stored on the device secure grows more important. Power analysis attacks involve cryptographic hardware leaking information during encryption because power consumption is correlated to the key used for encryption. Power analysis attacks have proven successful against public and private key cryptosystems in a variety of form factors. The majority of the countermeasures that have been proposed for this attack are intended for software implementations on a microcontroller. This project focuses on the development of a VHDL tool for investigating power analysis attacks on FPGAs and exploring countermeasures that might be used. The tool developed here counted the transitions of CLB output signals to estimate power and was used to explore the impact of possible gate-level countermeasures to differential power analysis. Using this tool, it was found that only a few nodes in the circuit have a high correlation to bits of the key. This means that modifying only a small portion of the circuit could dramatically increase the difficulty of mounting a differential power analysis attack on the hardware. Further investigation of the correlation between CLB outputs and the key showed that a tradeoff exists between the amount of space required for decorrelation versus the amount of decorrelation that is desired, allowing a designer to determine the amount of correlation that can be removed for available space. Filtering of glitches on CLB output signals slightly reduced the amount of correlation each CLB had. Finally, a decorrelation circuit was proposed and shown capable of decorrelating flip-flop outputs of a CLB, which account for less than 10% of the CLB outputs signals. Master of Science 2014-03-14T20:39:30Z 2014-03-14T20:39:30Z 2003-03-29 2003-06-06 2003-07-22 2003-07-22 Thesis etd-06062003-163826 http://hdl.handle.net/10919/33451 http://scholar.lib.vt.edu/theses/available/etd-06062003-163826/ Larry_McDaniel.pdf In Copyright http://rightsstatements.org/vocab/InC/1.0/ application/pdf Virginia Tech |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
DPA Data Encryption Standard SPA power analysis |
spellingShingle |
DPA Data Encryption Standard SPA power analysis McDaniel, Larry T. III An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems |
description |
Hardware devices implementing cryptographic algorithms are finding their way into many applications. As this happens, the ability to keep the data being processed or stored on the device secure grows more important. Power analysis attacks involve cryptographic hardware leaking information during encryption because power consumption is correlated to the key used for encryption. Power analysis attacks have proven successful against public and private key cryptosystems in a variety of form factors. The majority of the countermeasures that have been proposed for this attack are intended for software implementations on a microcontroller. This project focuses on the development of a VHDL tool for investigating power analysis attacks on FPGAs and exploring countermeasures that might be used.
The tool developed here counted the transitions of CLB output signals to estimate power and was used to explore the impact of possible gate-level countermeasures to differential power analysis. Using this tool, it was found that only a few nodes in the circuit have a high correlation to bits of the key. This means that modifying only a small portion of the circuit could dramatically increase the difficulty of mounting a differential power analysis attack on the hardware. Further investigation of the correlation between CLB outputs and the key showed that a tradeoff exists between the amount of space required for decorrelation versus the amount of decorrelation that is desired, allowing a designer to determine the amount of correlation that can be removed for available space. Filtering of glitches on CLB output signals slightly reduced the amount of correlation each CLB had. Finally, a decorrelation circuit was proposed and shown capable of decorrelating flip-flop outputs of a CLB, which account for less than 10% of the CLB outputs signals. === Master of Science |
author2 |
Electrical and Computer Engineering |
author_facet |
Electrical and Computer Engineering McDaniel, Larry T. III |
author |
McDaniel, Larry T. III |
author_sort |
McDaniel, Larry T. III |
title |
An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems |
title_short |
An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems |
title_full |
An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems |
title_fullStr |
An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems |
title_full_unstemmed |
An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems |
title_sort |
investigation of differential power analysis attacks on fpga-based encryption systems |
publisher |
Virginia Tech |
publishDate |
2014 |
url |
http://hdl.handle.net/10919/33451 http://scholar.lib.vt.edu/theses/available/etd-06062003-163826/ |
work_keys_str_mv |
AT mcdaniellarrytiii aninvestigationofdifferentialpoweranalysisattacksonfpgabasedencryptionsystems AT mcdaniellarrytiii investigationofdifferentialpoweranalysisattacksonfpgabasedencryptionsystems |
_version_ |
1719342707413876736 |