Backing the Wrong Horse: How Bit-Level Netlist Augmentation can Counter Power Side Channel Attacks
By: Ali Asghar, Andreas Becher, Daniel Ziener
Potential Business Impact:
Stops hackers from stealing secrets from computer chips.
The dependence of power-consumption on the processed data is a known vulnerability of CMOS circuits, resulting in side channels which can be exploited by power-based side channel attacks (SCAs). These attacks can extract sensitive information, such as secret keys, from the implementation of cryptographic algorithms. Existing countermeasures against power-based side channel attacks focus on analyzing information leakage at the byte level. However, this approach neglects the impact of individual bits on the overall resistance of a cryptographic implementation. In this work, we present a countermeasure based on single-bit leakage. The results suggest that the proposed countermeasure cannot be broken by attacks using conventional SCA leakage models.
Similar Papers
Application-Specific Power Side-Channel Attacks and Countermeasures: A Survey
Cryptography and Security
Protects secrets by hiding how much power a device uses.
Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Cryptography and Security
Protects secret computer codes from being stolen.
Power Side-Channel Analysis of the CVA6 RISC-V Core at the RTL Level Using VeriSide
Cryptography and Security
Finds secret codes hidden in computer chips.