Loading…

Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks

Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primi...

Full description

Saved in:
Bibliographic Details
Main Authors: Tran, Thai-Ha, Dam, Duc-Thuan, Kieu-Do-Nguyen, Binh, Hoang, Van-Phuc, Hoang, Trong-Thuc, Pham, Cong-Kha
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 5
container_issue
container_start_page 1
container_title
container_volume
creator Tran, Thai-Ha
Dam, Duc-Thuan
Kieu-Do-Nguyen, Binh
Hoang, Van-Phuc
Hoang, Trong-Thuc
Pham, Cong-Kha
description Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primitive has been utilized in several time-based hiding countermeasures against side-channel attacks. However, they cannot be applied to ASIC implementations because the MMCM is a Xilinx primitive. Consequently, this paper proposes a hybrid dynamic Gold code-based solution to generate multiple different frequencies. The countermeasure combines a pair of preferred polynomials with one ring oscillator, so it is suitable for both FPGA and ASIC designs. The hardware overhead of our suggested architecture is 1.007× and 1.009× in terms of slice LUTs and registers, respectively. The total area cost of the circuit on the CMOS 0.18 um process is 398,835 square micrometers, representing a 1.004x increase compared to the unprotected case. Moreover, the approach is resistant to both standard and sliding window-based Correlation Power Analysis attacks, even when employing UP to one million power traces.
doi_str_mv 10.1109/PST62714.2024.10788048
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10788048</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10788048</ieee_id><sourcerecordid>10788048</sourcerecordid><originalsourceid>FETCH-ieee_primary_107880483</originalsourceid><addsrcrecordid>eNqFj81Kw0AUhaeC0KJ5A5F5gcQ7P2aSZY3auBPafbk2t3XazKTMTJG8vRF07ep8cD4OHMbuBRRCQP3wvt6U0ghdSJC6EGCqCnQ1Y1lt6ko9gioN1OUVW8hSq1xP1pxlMR4BQElQRssFO7QYui8MxN_cuSdHPmGyg-fDniNvx49gO_48enR2x1dD3_Fm6Ch_wkg_ePGJgiOMl2lheUDrY-JrOxnNJ3pPPV-mhLtTvGXXe-wjZb95w-5eXzZNm1si2p6DdRjG7d8H9U_9DSkNSm4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks</title><source>IEEE Xplore All Conference Series</source><creator>Tran, Thai-Ha ; Dam, Duc-Thuan ; Kieu-Do-Nguyen, Binh ; Hoang, Van-Phuc ; Hoang, Trong-Thuc ; Pham, Cong-Kha</creator><creatorcontrib>Tran, Thai-Ha ; Dam, Duc-Thuan ; Kieu-Do-Nguyen, Binh ; Hoang, Van-Phuc ; Hoang, Trong-Thuc ; Pham, Cong-Kha</creatorcontrib><description>Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primitive has been utilized in several time-based hiding countermeasures against side-channel attacks. However, they cannot be applied to ASIC implementations because the MMCM is a Xilinx primitive. Consequently, this paper proposes a hybrid dynamic Gold code-based solution to generate multiple different frequencies. The countermeasure combines a pair of preferred polynomials with one ring oscillator, so it is suitable for both FPGA and ASIC designs. The hardware overhead of our suggested architecture is 1.007× and 1.009× in terms of slice LUTs and registers, respectively. The total area cost of the circuit on the CMOS 0.18 um process is 398,835 square micrometers, representing a 1.004x increase compared to the unprotected case. Moreover, the approach is resistant to both standard and sliding window-based Correlation Power Analysis attacks, even when employing UP to one million power traces.</description><identifier>EISSN: 2643-4202</identifier><identifier>EISBN: 9798350367096</identifier><identifier>DOI: 10.1109/PST62714.2024.10788048</identifier><language>eng</language><publisher>IEEE</publisher><subject>Countermeasure ; Gold ; horizontal hiding ; Proposals ; Protection ; random number generator ; Registers ; Resistance ; Ring generators ; Ring oscillators ; Side-channel attacks ; Table lookup</subject><ispartof>Annual International Conference on Privacy, Security and Trust (Online), 2024, p.1-5</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10788048$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10788048$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Tran, Thai-Ha</creatorcontrib><creatorcontrib>Dam, Duc-Thuan</creatorcontrib><creatorcontrib>Kieu-Do-Nguyen, Binh</creatorcontrib><creatorcontrib>Hoang, Van-Phuc</creatorcontrib><creatorcontrib>Hoang, Trong-Thuc</creatorcontrib><creatorcontrib>Pham, Cong-Kha</creatorcontrib><title>Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks</title><title>Annual International Conference on Privacy, Security and Trust (Online)</title><addtitle>PST</addtitle><description>Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primitive has been utilized in several time-based hiding countermeasures against side-channel attacks. However, they cannot be applied to ASIC implementations because the MMCM is a Xilinx primitive. Consequently, this paper proposes a hybrid dynamic Gold code-based solution to generate multiple different frequencies. The countermeasure combines a pair of preferred polynomials with one ring oscillator, so it is suitable for both FPGA and ASIC designs. The hardware overhead of our suggested architecture is 1.007× and 1.009× in terms of slice LUTs and registers, respectively. The total area cost of the circuit on the CMOS 0.18 um process is 398,835 square micrometers, representing a 1.004x increase compared to the unprotected case. Moreover, the approach is resistant to both standard and sliding window-based Correlation Power Analysis attacks, even when employing UP to one million power traces.</description><subject>Countermeasure</subject><subject>Gold</subject><subject>horizontal hiding</subject><subject>Proposals</subject><subject>Protection</subject><subject>random number generator</subject><subject>Registers</subject><subject>Resistance</subject><subject>Ring generators</subject><subject>Ring oscillators</subject><subject>Side-channel attacks</subject><subject>Table lookup</subject><issn>2643-4202</issn><isbn>9798350367096</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqFj81Kw0AUhaeC0KJ5A5F5gcQ7P2aSZY3auBPafbk2t3XazKTMTJG8vRF07ep8cD4OHMbuBRRCQP3wvt6U0ghdSJC6EGCqCnQ1Y1lt6ko9gioN1OUVW8hSq1xP1pxlMR4BQElQRssFO7QYui8MxN_cuSdHPmGyg-fDniNvx49gO_48enR2x1dD3_Fm6Ch_wkg_ePGJgiOMl2lheUDrY-JrOxnNJ3pPPV-mhLtTvGXXe-wjZb95w-5eXzZNm1si2p6DdRjG7d8H9U_9DSkNSm4</recordid><startdate>20240828</startdate><enddate>20240828</enddate><creator>Tran, Thai-Ha</creator><creator>Dam, Duc-Thuan</creator><creator>Kieu-Do-Nguyen, Binh</creator><creator>Hoang, Van-Phuc</creator><creator>Hoang, Trong-Thuc</creator><creator>Pham, Cong-Kha</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20240828</creationdate><title>Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks</title><author>Tran, Thai-Ha ; Dam, Duc-Thuan ; Kieu-Do-Nguyen, Binh ; Hoang, Van-Phuc ; Hoang, Trong-Thuc ; Pham, Cong-Kha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_107880483</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Countermeasure</topic><topic>Gold</topic><topic>horizontal hiding</topic><topic>Proposals</topic><topic>Protection</topic><topic>random number generator</topic><topic>Registers</topic><topic>Resistance</topic><topic>Ring generators</topic><topic>Ring oscillators</topic><topic>Side-channel attacks</topic><topic>Table lookup</topic><toplevel>online_resources</toplevel><creatorcontrib>Tran, Thai-Ha</creatorcontrib><creatorcontrib>Dam, Duc-Thuan</creatorcontrib><creatorcontrib>Kieu-Do-Nguyen, Binh</creatorcontrib><creatorcontrib>Hoang, Van-Phuc</creatorcontrib><creatorcontrib>Hoang, Trong-Thuc</creatorcontrib><creatorcontrib>Pham, Cong-Kha</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Tran, Thai-Ha</au><au>Dam, Duc-Thuan</au><au>Kieu-Do-Nguyen, Binh</au><au>Hoang, Van-Phuc</au><au>Hoang, Trong-Thuc</au><au>Pham, Cong-Kha</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks</atitle><btitle>Annual International Conference on Privacy, Security and Trust (Online)</btitle><stitle>PST</stitle><date>2024-08-28</date><risdate>2024</risdate><spage>1</spage><epage>5</epage><pages>1-5</pages><eissn>2643-4202</eissn><eisbn>9798350367096</eisbn><abstract>Side-channel attacks have emerged as the predominant approach for exploiting the weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to prioritize countermeasures that can improve the security level of these implementations. A Mixed-Mode Clock Manager (MMCM) primitive has been utilized in several time-based hiding countermeasures against side-channel attacks. However, they cannot be applied to ASIC implementations because the MMCM is a Xilinx primitive. Consequently, this paper proposes a hybrid dynamic Gold code-based solution to generate multiple different frequencies. The countermeasure combines a pair of preferred polynomials with one ring oscillator, so it is suitable for both FPGA and ASIC designs. The hardware overhead of our suggested architecture is 1.007× and 1.009× in terms of slice LUTs and registers, respectively. The total area cost of the circuit on the CMOS 0.18 um process is 398,835 square micrometers, representing a 1.004x increase compared to the unprotected case. Moreover, the approach is resistant to both standard and sliding window-based Correlation Power Analysis attacks, even when employing UP to one million power traces.</abstract><pub>IEEE</pub><doi>10.1109/PST62714.2024.10788048</doi></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2643-4202
ispartof Annual International Conference on Privacy, Security and Trust (Online), 2024, p.1-5
issn 2643-4202
language eng
recordid cdi_ieee_primary_10788048
source IEEE Xplore All Conference Series
subjects Countermeasure
Gold
horizontal hiding
Proposals
Protection
random number generator
Registers
Resistance
Ring generators
Ring oscillators
Side-channel attacks
Table lookup
title Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T14%3A51%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Hardware%20Implementation%20of%20a%20Hybrid%20Dynamic%20Gold%20Code-Based%20Countermeasure%20Against%20Side-Channel%20Attacks&rft.btitle=Annual%20International%20Conference%20on%20Privacy,%20Security%20and%20Trust%20(Online)&rft.au=Tran,%20Thai-Ha&rft.date=2024-08-28&rft.spage=1&rft.epage=5&rft.pages=1-5&rft.eissn=2643-4202&rft_id=info:doi/10.1109/PST62714.2024.10788048&rft.eisbn=9798350367096&rft_dat=%3Cieee_CHZPO%3E10788048%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-ieee_primary_107880483%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10788048&rfr_iscdi=true