310 likes | 500 Views
Smart card security. Speaker: 陳 育 麟 Advisor: 陳 中 平 教授. Outline. Introduction of SCAs Cryptographic Algorithms Measurements Hamming Weight Simple Power Attack (SPA) Differential Power Attack (DPA) Countermeasures My Countermeasure: EPS Conclusion for EPS. Introduction of SCAs.
E N D
Smart card security Speaker: 陳 育 麟 Advisor: 陳 中 平 教授
Outline • Introduction of SCAs • Cryptographic Algorithms • Measurements • Hamming Weight • Simple Power Attack (SPA) • Differential Power Attack (DPA) • Countermeasures • My Countermeasure: EPS • Conclusion for EPS
Introduction of SCAs • Side channel attacks (SCAs)Security ICs are vulnerable to Side-Channel Attacks (SCAs). SCAs find the secret key by monitoring the power consumption, timing information, or electromagnetic radiation that is leaked by the switching behavior of digital CMOS gates, rather than theoretical weaknesses in the algorithms. • Side-channel Information: • Power consumption • Electromagnetic radiation • Timing … Our focus Cryptographic processing (Encrypt / Decrypt) Input message Output message Secret keys
Introduction of SCAs (cont’) • What kinds of SCAs?1. Differential Fault Analysis (DFA) - Biham-Shamir (1997) 2.Timing Attacks - Kocher (1996) 3. Simple Power Analysis (SPA) - Kocher, Jaffe, Jun (1998) 4. Differential Power Analysis (DPA) - Kocher, Jaffe, Jun (1998) Not very accurate! Very accurate!
Cryptographic Algorithms • Data Encryption Standard (DES) • Advanced Encryption Standard (AES) • RSA • Elliptic curve … These cryptographic algorithms can be implemented by either software programming or specific hardware circuit.
Measurements • Tools • Destructive Measurement • Non-destructive Measurement
Measurements (cont’) • Tools Voltage probe Oscilloscope Current probe
Measurements (1) • Destructive MeasurementA small resistor (e.g., 50Ω) is inserted in series with Vdd or GND.
Measurements (2) • Non-destructive MeasurementWe need not modify the original circuit.
Hamming Weight • Hamming Weight vs. Power Consumption Suggest that this curve is the power consumption profile of XOR. Voltage or Current
Simple Power Attack (SPA) • Directly interpret the power consumption 1,2,3 … 16 2nd 3rd Different microprocessor instructions consume different power. Thus, the power consumption profiles are different. ROTATE X1 ROTATE X2
Differential Power Attack (DPA) • Use extra statistical methods
Countermeasures • Power Consumption Balancing This technique is suitable to logic-level synthesis, but its performance is limit.
Countermeasures (1) • Addition of NoiseTo make the power consumption profile blur! To guarantee the efficiency of these two methods, the frequency of the random digit generation might be several time higher than the frequency of the system clock, and the magnitude of the noise might be a lot larger than the original system. Thus, the power consumption is very high. By the way, the area overhead is too high. Not resistant to DPA attack!Not a complete solution! Related patent:US 6,327,661
Countermeasures (2.1) • Isolation circuit (1) Use an RC low-pass filter to blur the power consumption. But … “…Of course, the finite rds and capacitive coupling from drain to gate of MP1 limit the extent of the isolation…,” the paper said. Therefore … Not blurred enough!Not power efficient! Patrick Rakers, Larry Connell, Tim Collins, D Russell “Secure Contactless Smartcard ASIC with DPA Protection”, IEEE Journal of Solid-State Circuits, 2001.
Countermeasures (2.2) • Isolation circuit (2)
Countermeasures (2.3) • Isolation circuit (3) Quoted from:US Patent: 6,510,518 (Jan, 21, 2003)“Balanced Cryptographic Computational Method and Apparatus for Leak Minimization in SmartCards and Other Cryptosystems”
Countermeasures (3.1) • WDDL (1)WDDL stands for Wave Dynamic Differential Logic.It is based on ‘constant power consumption technique’. K. Tiri, D. Hwang, A. Hodjat, B. Lai, S. Yang, P. Schaumont, and I. Verbauwhede, “A Side-Channel Leakage Free Coprocessor IC in 0.18μm CMOS for Embedded AES-based Cryptographic and Biometric Processing”, DAC, June 2005.
Countermeasures (3.2) • WDDL (2) WDDL / Standard CMOS:Area: 3XPower Consumption: 13.5XSpeed: 0.24X • Resistant to both SPA and DPA attack! • The power consumption profile is completely blurred! • It is an effective method! But … • Dynamic logic is sensitive to noise! • The overheads are too high! • Not an economic method! WDDL Standard CMOS
Countermeasures (3.3) • WDDL: Input buffers
Countermeasures (3.4) • SDDL: Core INV gates Core SDDL INV Gate (n-logic) Core SDDL INV Gate (p-logic)
Countermeasures (3.5) • SDDL: Output buffers Core SDDL INV Gate (n-logic) Core SDDL INV Gate (p-logic)
My Countermeasure: EPS • Embedded Power Supply (EPS) Technology:Charge sharing phenomenon.Dynamic regulation. • Main goal:1. Resistant to both SPA and DPA attack! 2. To make the power consumption profile completely blurred! (like ‘addition of noise’ or ‘WDDL’) 3. Area overhead: less than 10%4. On the power consumption side, very little is increased! (not more than 5%)5. On the performance side, very little is lost! (not more than 5%) 6. Very easy to integrate with other circuits!
My Countermeasure: EPS (cont’) • Embedded Power Supply (EPS) The minimum supply voltage of standard CMOS logic is: During the encryption, the pMOS is off and the secure circuit uses the charges of the charge pre-storing capacitor to do the encryption. Thus, no side-channel information is leaked during the encryption. By institute, the charge pre-storing capacitor is very large; therefore, It needs improvement.
My Countermeasure: EPS (cont’) • Improvement for EPS This improvement takes more clocks to finish an encryption. However, this weakness can be avoided by using two charge pre-storing capacitor.
My Countermeasure: EPS (cont’) • Further Improvement for EPS If the secure circuit is positive edge-triggered, the control logic will be negative edge-triggered.
Conclusion for EPS • Capacitor size:Cps >> Cps’ > Cps1 = Cps2 • Area overhead:less than 10% • On the power consumption side, very little has been increased! • On the performance side, very little has been lost! • Resistant to both SPA and DPA attack.