An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems

Hardware devices implementing cryptographic algorithms are finding their way into many applications. As this happens, the ability to keep the data being processed or stored on the device secure grows more important. Power analysis attacks involve cryptographic hardware leaking information during e...

Full description

Bibliographic Details
Main Author: McDaniel, Larry T. III
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2014
Subjects:
DPA
SPA
Online Access:http://hdl.handle.net/10919/33451
http://scholar.lib.vt.edu/theses/available/etd-06062003-163826/
id ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-33451
record_format oai_dc
spelling ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-334512020-09-26T05:38:39Z An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems McDaniel, Larry T. III Electrical and Computer Engineering Martin, Thomas L. Jones, Mark T. Athanas, Peter M. DPA Data Encryption Standard SPA power analysis Hardware devices implementing cryptographic algorithms are finding their way into many applications. As this happens, the ability to keep the data being processed or stored on the device secure grows more important. Power analysis attacks involve cryptographic hardware leaking information during encryption because power consumption is correlated to the key used for encryption. Power analysis attacks have proven successful against public and private key cryptosystems in a variety of form factors. The majority of the countermeasures that have been proposed for this attack are intended for software implementations on a microcontroller. This project focuses on the development of a VHDL tool for investigating power analysis attacks on FPGAs and exploring countermeasures that might be used. The tool developed here counted the transitions of CLB output signals to estimate power and was used to explore the impact of possible gate-level countermeasures to differential power analysis. Using this tool, it was found that only a few nodes in the circuit have a high correlation to bits of the key. This means that modifying only a small portion of the circuit could dramatically increase the difficulty of mounting a differential power analysis attack on the hardware. Further investigation of the correlation between CLB outputs and the key showed that a tradeoff exists between the amount of space required for decorrelation versus the amount of decorrelation that is desired, allowing a designer to determine the amount of correlation that can be removed for available space. Filtering of glitches on CLB output signals slightly reduced the amount of correlation each CLB had. Finally, a decorrelation circuit was proposed and shown capable of decorrelating flip-flop outputs of a CLB, which account for less than 10% of the CLB outputs signals. Master of Science 2014-03-14T20:39:30Z 2014-03-14T20:39:30Z 2003-03-29 2003-06-06 2003-07-22 2003-07-22 Thesis etd-06062003-163826 http://hdl.handle.net/10919/33451 http://scholar.lib.vt.edu/theses/available/etd-06062003-163826/ Larry_McDaniel.pdf In Copyright http://rightsstatements.org/vocab/InC/1.0/ application/pdf Virginia Tech
collection NDLTD
format Others
sources NDLTD
topic DPA
Data Encryption Standard
SPA
power analysis
spellingShingle DPA
Data Encryption Standard
SPA
power analysis
McDaniel, Larry T. III
An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems
description Hardware devices implementing cryptographic algorithms are finding their way into many applications. As this happens, the ability to keep the data being processed or stored on the device secure grows more important. Power analysis attacks involve cryptographic hardware leaking information during encryption because power consumption is correlated to the key used for encryption. Power analysis attacks have proven successful against public and private key cryptosystems in a variety of form factors. The majority of the countermeasures that have been proposed for this attack are intended for software implementations on a microcontroller. This project focuses on the development of a VHDL tool for investigating power analysis attacks on FPGAs and exploring countermeasures that might be used. The tool developed here counted the transitions of CLB output signals to estimate power and was used to explore the impact of possible gate-level countermeasures to differential power analysis. Using this tool, it was found that only a few nodes in the circuit have a high correlation to bits of the key. This means that modifying only a small portion of the circuit could dramatically increase the difficulty of mounting a differential power analysis attack on the hardware. Further investigation of the correlation between CLB outputs and the key showed that a tradeoff exists between the amount of space required for decorrelation versus the amount of decorrelation that is desired, allowing a designer to determine the amount of correlation that can be removed for available space. Filtering of glitches on CLB output signals slightly reduced the amount of correlation each CLB had. Finally, a decorrelation circuit was proposed and shown capable of decorrelating flip-flop outputs of a CLB, which account for less than 10% of the CLB outputs signals. === Master of Science
author2 Electrical and Computer Engineering
author_facet Electrical and Computer Engineering
McDaniel, Larry T. III
author McDaniel, Larry T. III
author_sort McDaniel, Larry T. III
title An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems
title_short An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems
title_full An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems
title_fullStr An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems
title_full_unstemmed An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems
title_sort investigation of differential power analysis attacks on fpga-based encryption systems
publisher Virginia Tech
publishDate 2014
url http://hdl.handle.net/10919/33451
http://scholar.lib.vt.edu/theses/available/etd-06062003-163826/
work_keys_str_mv AT mcdaniellarrytiii aninvestigationofdifferentialpoweranalysisattacksonfpgabasedencryptionsystems
AT mcdaniellarrytiii investigationofdifferentialpoweranalysisattacksonfpgabasedencryptionsystems
_version_ 1719342707413876736