Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding such resource-constrained hardware from side-channel attacks poses a significant challenge. Adiabatic circuit operation has recently receive...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-06-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/10/12/1438 |
_version_ | 1797530082040872960 |
---|---|
author | Krithika Dhananjay Emre Salman |
author_facet | Krithika Dhananjay Emre Salman |
author_sort | Krithika Dhananjay |
collection | DOAJ |
description | SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding such resource-constrained hardware from side-channel attacks poses a significant challenge. Adiabatic circuit operation has recently received attention for such applications due to ultra-low power consumption. In this work, a charge-based methodology is developed to mount a correlation power analysis (CPA) based side-channel attack to an adiabatic SIMON core. The charge-based method significantly reduces the attack complexity by reducing the required number of power samples by two orders of magnitude. The CPA results demonstrate that the required measurements-to-disclosure (MTD) to retrieve the secret key of an adiabatic SIMON core is 4× higher compared to a conventional static CMOS based implementation. The effect of increase in the target signal load capacitance on the MTD is also investigated. It is observed that the MTD can be reduced by half if the load driven by the target signal is increased by 2× for an adiabatic SIMON, and by 5× for a static CMOS based SIMON. This sensitivity to target signal capacitance of the adiabatic SIMON can pose a serious concern by facilitating a more efficient CPA attack. |
first_indexed | 2024-03-10T10:23:53Z |
format | Article |
id | doaj.art-d7b6d9a0e9584c949d971a1f2dba7321 |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-10T10:23:53Z |
publishDate | 2021-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-d7b6d9a0e9584c949d971a1f2dba73212023-11-22T00:14:56ZengMDPI AGElectronics2079-92922021-06-011012143810.3390/electronics10121438Charge Based Power Side-Channel Attack Methodology for an Adiabatic CipherKrithika Dhananjay0Emre Salman1Department of Electrical and Computer Engineering, Stony Brook University, Stony Brook, NY 11794, USADepartment of Electrical and Computer Engineering, Stony Brook University, Stony Brook, NY 11794, USASIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding such resource-constrained hardware from side-channel attacks poses a significant challenge. Adiabatic circuit operation has recently received attention for such applications due to ultra-low power consumption. In this work, a charge-based methodology is developed to mount a correlation power analysis (CPA) based side-channel attack to an adiabatic SIMON core. The charge-based method significantly reduces the attack complexity by reducing the required number of power samples by two orders of magnitude. The CPA results demonstrate that the required measurements-to-disclosure (MTD) to retrieve the secret key of an adiabatic SIMON core is 4× higher compared to a conventional static CMOS based implementation. The effect of increase in the target signal load capacitance on the MTD is also investigated. It is observed that the MTD can be reduced by half if the load driven by the target signal is increased by 2× for an adiabatic SIMON, and by 5× for a static CMOS based SIMON. This sensitivity to target signal capacitance of the adiabatic SIMON can pose a serious concern by facilitating a more efficient CPA attack.https://www.mdpi.com/2079-9292/10/12/1438adiabatic circuitsapplication-specific integrated circuit (ASIC)correlation power analysis (CPA)lightweight encryptionside-channel attackSIMON core |
spellingShingle | Krithika Dhananjay Emre Salman Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher Electronics adiabatic circuits application-specific integrated circuit (ASIC) correlation power analysis (CPA) lightweight encryption side-channel attack SIMON core |
title | Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher |
title_full | Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher |
title_fullStr | Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher |
title_full_unstemmed | Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher |
title_short | Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher |
title_sort | charge based power side channel attack methodology for an adiabatic cipher |
topic | adiabatic circuits application-specific integrated circuit (ASIC) correlation power analysis (CPA) lightweight encryption side-channel attack SIMON core |
url | https://www.mdpi.com/2079-9292/10/12/1438 |
work_keys_str_mv | AT krithikadhananjay chargebasedpowersidechannelattackmethodologyforanadiabaticcipher AT emresalman chargebasedpowersidechannelattackmethodologyforanadiabaticcipher |