Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher

SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding such resource-constrained hardware from side-channel attacks poses a significant challenge. Adiabatic circuit operation has recently receive...

Full description

Bibliographic Details
Main Authors: Krithika Dhananjay, Emre Salman
Format: Article
Language:English
Published: MDPI AG 2021-06-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/12/1438
_version_ 1797530082040872960
author Krithika Dhananjay
Emre Salman
author_facet Krithika Dhananjay
Emre Salman
author_sort Krithika Dhananjay
collection DOAJ
description SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding such resource-constrained hardware from side-channel attacks poses a significant challenge. Adiabatic circuit operation has recently received attention for such applications due to ultra-low power consumption. In this work, a charge-based methodology is developed to mount a correlation power analysis (CPA) based side-channel attack to an adiabatic SIMON core. The charge-based method significantly reduces the attack complexity by reducing the required number of power samples by two orders of magnitude. The CPA results demonstrate that the required measurements-to-disclosure (MTD) to retrieve the secret key of an adiabatic SIMON core is 4× higher compared to a conventional static CMOS based implementation. The effect of increase in the target signal load capacitance on the MTD is also investigated. It is observed that the MTD can be reduced by half if the load driven by the target signal is increased by 2× for an adiabatic SIMON, and by 5× for a static CMOS based SIMON. This sensitivity to target signal capacitance of the adiabatic SIMON can pose a serious concern by facilitating a more efficient CPA attack.
first_indexed 2024-03-10T10:23:53Z
format Article
id doaj.art-d7b6d9a0e9584c949d971a1f2dba7321
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T10:23:53Z
publishDate 2021-06-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-d7b6d9a0e9584c949d971a1f2dba73212023-11-22T00:14:56ZengMDPI AGElectronics2079-92922021-06-011012143810.3390/electronics10121438Charge Based Power Side-Channel Attack Methodology for an Adiabatic CipherKrithika Dhananjay0Emre Salman1Department of Electrical and Computer Engineering, Stony Brook University, Stony Brook, NY 11794, USADepartment of Electrical and Computer Engineering, Stony Brook University, Stony Brook, NY 11794, USASIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding such resource-constrained hardware from side-channel attacks poses a significant challenge. Adiabatic circuit operation has recently received attention for such applications due to ultra-low power consumption. In this work, a charge-based methodology is developed to mount a correlation power analysis (CPA) based side-channel attack to an adiabatic SIMON core. The charge-based method significantly reduces the attack complexity by reducing the required number of power samples by two orders of magnitude. The CPA results demonstrate that the required measurements-to-disclosure (MTD) to retrieve the secret key of an adiabatic SIMON core is 4× higher compared to a conventional static CMOS based implementation. The effect of increase in the target signal load capacitance on the MTD is also investigated. It is observed that the MTD can be reduced by half if the load driven by the target signal is increased by 2× for an adiabatic SIMON, and by 5× for a static CMOS based SIMON. This sensitivity to target signal capacitance of the adiabatic SIMON can pose a serious concern by facilitating a more efficient CPA attack.https://www.mdpi.com/2079-9292/10/12/1438adiabatic circuitsapplication-specific integrated circuit (ASIC)correlation power analysis (CPA)lightweight encryptionside-channel attackSIMON core
spellingShingle Krithika Dhananjay
Emre Salman
Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
Electronics
adiabatic circuits
application-specific integrated circuit (ASIC)
correlation power analysis (CPA)
lightweight encryption
side-channel attack
SIMON core
title Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
title_full Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
title_fullStr Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
title_full_unstemmed Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
title_short Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
title_sort charge based power side channel attack methodology for an adiabatic cipher
topic adiabatic circuits
application-specific integrated circuit (ASIC)
correlation power analysis (CPA)
lightweight encryption
side-channel attack
SIMON core
url https://www.mdpi.com/2079-9292/10/12/1438
work_keys_str_mv AT krithikadhananjay chargebasedpowersidechannelattackmethodologyforanadiabaticcipher
AT emresalman chargebasedpowersidechannelattackmethodologyforanadiabaticcipher