Loading…
Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks
Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primi...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 5 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Tran, Thai-Ha Dam, Duc-Thuan Kieu-Do-Nguyen, Binh Hoang, Van-Phuc Hoang, Trong-Thuc Pham, Cong-Kha |
description | Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primitive has been utilized in several time-based hiding countermeasures against side-channel attacks. However, they cannot be applied to ASIC implementations because the MMCM is a Xilinx primitive. Consequently, this paper proposes a hybrid dynamic Gold code-based solution to generate multiple different frequencies. The countermeasure combines a pair of preferred polynomials with one ring oscillator, so it is suitable for both FPGA and ASIC designs. The hardware overhead of our suggested architecture is 1.007× and 1.009× in terms of slice LUTs and registers, respectively. The total area cost of the circuit on the CMOS 0.18 um process is 398,835 square micrometers, representing a 1.004x increase compared to the unprotected case. Moreover, the approach is resistant to both standard and sliding window-based Correlation Power Analysis attacks, even when employing UP to one million power traces. |
doi_str_mv | 10.1109/PST62714.2024.10788048 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10788048</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10788048</ieee_id><sourcerecordid>10788048</sourcerecordid><originalsourceid>FETCH-ieee_primary_107880483</originalsourceid><addsrcrecordid>eNqFj81Kw0AUhaeC0KJ5A5F5gcQ7P2aSZY3auBPafbk2t3XazKTMTJG8vRF07ep8cD4OHMbuBRRCQP3wvt6U0ghdSJC6EGCqCnQ1Y1lt6ko9gioN1OUVW8hSq1xP1pxlMR4BQElQRssFO7QYui8MxN_cuSdHPmGyg-fDniNvx49gO_48enR2x1dD3_Fm6Ch_wkg_ePGJgiOMl2lheUDrY-JrOxnNJ3pPPV-mhLtTvGXXe-wjZb95w-5eXzZNm1si2p6DdRjG7d8H9U_9DSkNSm4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks</title><source>IEEE Xplore All Conference Series</source><creator>Tran, Thai-Ha ; Dam, Duc-Thuan ; Kieu-Do-Nguyen, Binh ; Hoang, Van-Phuc ; Hoang, Trong-Thuc ; Pham, Cong-Kha</creator><creatorcontrib>Tran, Thai-Ha ; Dam, Duc-Thuan ; Kieu-Do-Nguyen, Binh ; Hoang, Van-Phuc ; Hoang, Trong-Thuc ; Pham, Cong-Kha</creatorcontrib><description>Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primitive has been utilized in several time-based hiding countermeasures against side-channel attacks. However, they cannot be applied to ASIC implementations because the MMCM is a Xilinx primitive. Consequently, this paper proposes a hybrid dynamic Gold code-based solution to generate multiple different frequencies. The countermeasure combines a pair of preferred polynomials with one ring oscillator, so it is suitable for both FPGA and ASIC designs. The hardware overhead of our suggested architecture is 1.007× and 1.009× in terms of slice LUTs and registers, respectively. The total area cost of the circuit on the CMOS 0.18 um process is 398,835 square micrometers, representing a 1.004x increase compared to the unprotected case. Moreover, the approach is resistant to both standard and sliding window-based Correlation Power Analysis attacks, even when employing UP to one million power traces.</description><identifier>EISSN: 2643-4202</identifier><identifier>EISBN: 9798350367096</identifier><identifier>DOI: 10.1109/PST62714.2024.10788048</identifier><language>eng</language><publisher>IEEE</publisher><subject>Countermeasure ; Gold ; horizontal hiding ; Proposals ; Protection ; random number generator ; Registers ; Resistance ; Ring generators ; Ring oscillators ; Side-channel attacks ; Table lookup</subject><ispartof>Annual International Conference on Privacy, Security and Trust (Online), 2024, p.1-5</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10788048$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10788048$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Tran, Thai-Ha</creatorcontrib><creatorcontrib>Dam, Duc-Thuan</creatorcontrib><creatorcontrib>Kieu-Do-Nguyen, Binh</creatorcontrib><creatorcontrib>Hoang, Van-Phuc</creatorcontrib><creatorcontrib>Hoang, Trong-Thuc</creatorcontrib><creatorcontrib>Pham, Cong-Kha</creatorcontrib><title>Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks</title><title>Annual International Conference on Privacy, Security and Trust (Online)</title><addtitle>PST</addtitle><description>Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primitive has been utilized in several time-based hiding countermeasures against side-channel attacks. However, they cannot be applied to ASIC implementations because the MMCM is a Xilinx primitive. Consequently, this paper proposes a hybrid dynamic Gold code-based solution to generate multiple different frequencies. The countermeasure combines a pair of preferred polynomials with one ring oscillator, so it is suitable for both FPGA and ASIC designs. The hardware overhead of our suggested architecture is 1.007× and 1.009× in terms of slice LUTs and registers, respectively. The total area cost of the circuit on the CMOS 0.18 um process is 398,835 square micrometers, representing a 1.004x increase compared to the unprotected case. Moreover, the approach is resistant to both standard and sliding window-based Correlation Power Analysis attacks, even when employing UP to one million power traces.</description><subject>Countermeasure</subject><subject>Gold</subject><subject>horizontal hiding</subject><subject>Proposals</subject><subject>Protection</subject><subject>random number generator</subject><subject>Registers</subject><subject>Resistance</subject><subject>Ring generators</subject><subject>Ring oscillators</subject><subject>Side-channel attacks</subject><subject>Table lookup</subject><issn>2643-4202</issn><isbn>9798350367096</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqFj81Kw0AUhaeC0KJ5A5F5gcQ7P2aSZY3auBPafbk2t3XazKTMTJG8vRF07ep8cD4OHMbuBRRCQP3wvt6U0ghdSJC6EGCqCnQ1Y1lt6ko9gioN1OUVW8hSq1xP1pxlMR4BQElQRssFO7QYui8MxN_cuSdHPmGyg-fDniNvx49gO_48enR2x1dD3_Fm6Ch_wkg_ePGJgiOMl2lheUDrY-JrOxnNJ3pPPV-mhLtTvGXXe-wjZb95w-5eXzZNm1si2p6DdRjG7d8H9U_9DSkNSm4</recordid><startdate>20240828</startdate><enddate>20240828</enddate><creator>Tran, Thai-Ha</creator><creator>Dam, Duc-Thuan</creator><creator>Kieu-Do-Nguyen, Binh</creator><creator>Hoang, Van-Phuc</creator><creator>Hoang, Trong-Thuc</creator><creator>Pham, Cong-Kha</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20240828</creationdate><title>Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks</title><author>Tran, Thai-Ha ; Dam, Duc-Thuan ; Kieu-Do-Nguyen, Binh ; Hoang, Van-Phuc ; Hoang, Trong-Thuc ; Pham, Cong-Kha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_107880483</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Countermeasure</topic><topic>Gold</topic><topic>horizontal hiding</topic><topic>Proposals</topic><topic>Protection</topic><topic>random number generator</topic><topic>Registers</topic><topic>Resistance</topic><topic>Ring generators</topic><topic>Ring oscillators</topic><topic>Side-channel attacks</topic><topic>Table lookup</topic><toplevel>online_resources</toplevel><creatorcontrib>Tran, Thai-Ha</creatorcontrib><creatorcontrib>Dam, Duc-Thuan</creatorcontrib><creatorcontrib>Kieu-Do-Nguyen, Binh</creatorcontrib><creatorcontrib>Hoang, Van-Phuc</creatorcontrib><creatorcontrib>Hoang, Trong-Thuc</creatorcontrib><creatorcontrib>Pham, Cong-Kha</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Tran, Thai-Ha</au><au>Dam, Duc-Thuan</au><au>Kieu-Do-Nguyen, Binh</au><au>Hoang, Van-Phuc</au><au>Hoang, Trong-Thuc</au><au>Pham, Cong-Kha</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks</atitle><btitle>Annual International Conference on Privacy, Security and Trust (Online)</btitle><stitle>PST</stitle><date>2024-08-28</date><risdate>2024</risdate><spage>1</spage><epage>5</epage><pages>1-5</pages><eissn>2643-4202</eissn><eisbn>9798350367096</eisbn><abstract>Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primitive has been utilized in several time-based hiding countermeasures against side-channel attacks. However, they cannot be applied to ASIC implementations because the MMCM is a Xilinx primitive. Consequently, this paper proposes a hybrid dynamic Gold code-based solution to generate multiple different frequencies. The countermeasure combines a pair of preferred polynomials with one ring oscillator, so it is suitable for both FPGA and ASIC designs. The hardware overhead of our suggested architecture is 1.007× and 1.009× in terms of slice LUTs and registers, respectively. The total area cost of the circuit on the CMOS 0.18 um process is 398,835 square micrometers, representing a 1.004x increase compared to the unprotected case. Moreover, the approach is resistant to both standard and sliding window-based Correlation Power Analysis attacks, even when employing UP to one million power traces.</abstract><pub>IEEE</pub><doi>10.1109/PST62714.2024.10788048</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2643-4202 |
ispartof | Annual International Conference on Privacy, Security and Trust (Online), 2024, p.1-5 |
issn | 2643-4202 |
language | eng |
recordid | cdi_ieee_primary_10788048 |
source | IEEE Xplore All Conference Series |
subjects | Countermeasure Gold horizontal hiding Proposals Protection random number generator Registers Resistance Ring generators Ring oscillators Side-channel attacks Table lookup |
title | Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T14%3A51%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Hardware%20Implementation%20of%20a%20Hybrid%20Dynamic%20Gold%20Code-Based%20Countermeasure%20Against%20Side-Channel%20Attacks&rft.btitle=Annual%20International%20Conference%20on%20Privacy,%20Security%20and%20Trust%20(Online)&rft.au=Tran,%20Thai-Ha&rft.date=2024-08-28&rft.spage=1&rft.epage=5&rft.pages=1-5&rft.eissn=2643-4202&rft_id=info:doi/10.1109/PST62714.2024.10788048&rft.eisbn=9798350367096&rft_dat=%3Cieee_CHZPO%3E10788048%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-ieee_primary_107880483%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10788048&rfr_iscdi=true |