Score: 0

Backing the Wrong Horse: How Bit-Level Netlist Augmentation can Counter Power Side Channel Attacks

Published: October 6, 2025 | arXiv ID: 2510.04640v1

By: Ali Asghar, Andreas Becher, Daniel Ziener

Potential Business Impact:

Stops hackers from stealing secrets from computer chips.

Business Areas:
Application Specific Integrated Circuit (ASIC) Hardware

The dependence of power-consumption on the processed data is a known vulnerability of CMOS circuits, resulting in side channels which can be exploited by power-based side channel attacks (SCAs). These attacks can extract sensitive information, such as secret keys, from the implementation of cryptographic algorithms. Existing countermeasures against power-based side channel attacks focus on analyzing information leakage at the byte level. However, this approach neglects the impact of individual bits on the overall resistance of a cryptographic implementation. In this work, we present a countermeasure based on single-bit leakage. The results suggest that the proposed countermeasure cannot be broken by attacks using conventional SCA leakage models.

Country of Origin
🇩🇪 Germany

Page Count
5 pages

Category
Computer Science:
Cryptography and Security