Browse > Article
http://dx.doi.org/10.4218/etrij.2021-0074

Maximal overlap discrete wavelet transform-based power trace alignment algorithm against random delay countermeasure  

Paramasivam, Saravanan (Department of Electronics and Communication Engineering, PSG College of Technology)
PL, Srividhyaa Alamelu (Department of Electronics and Communication Engineering, PSG College of Technology)
Sathyamoorthi, Prashanth (Silicons and Systems, Juniper Networks India Pvt. Ltd.)
Publication Information
ETRI Journal / v.44, no.3, 2022 , pp. 512-523 More about this Journal
Abstract
Random delay countermeasures introduce random delays into the execution flow to break the synchronization and increase the complexity of the side channel attack. A novel method for attacking devices with random delay countermeasures has been proposed by using a maximal overlap discrete wavelet transform (MODWT)-based power trace alignment algorithm. Firstly, the random delay in the power traces is sensitized using MODWT to the captured power traces. Secondly, it is detected using the proposed random delay detection algorithm. Thirdly, random delays are removed by circular shifting in the wavelet domain, and finally, the power analysis attack is successfully mounted in the wavelet domain. Experimental validation of the proposed method with the National Institute of Standards and Technology certified Advanced Encryption Standard-128 cryptographic algorithm and the SAKURA-G platform showed a 7.5× reduction in measurements to disclosure and a 3.14× improvement in maximum correlation value when compared with similar works in the literature.
Keywords
hardware security; MODWT; power analysis attack; random delay countermeasure; side channel attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Zarrinchian and M. S. Zamani, Combinational counters: A low overhead approach to address DPA attacks, J. Circ. Syst. Comput. 29 (2020), no. 6, 2050097. https://doi.org/10.1142/S0218126620500978   DOI
2 P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Proc. Annu. Int. Cryptol. Conf., Santa Barbara, CA, USA, 1999, pp. 388-397. https://doi.org/10.1007/3-540-48405-1_25   DOI
3 J. S. Coron, and I. Kizhvatov, Analysis and improvement of the random delay countermeasure of CHES 2009, in Proc. Int. Conf. Cryptographic Hardw. Embedded Syst., 2010, pp. 95-109.
4 K. H. Boey, Y. Lu, M. O'Neill, and R. Woods, Random clock against differential power analysis, in Proc. IEEE Asia Pacific Conf. Circuits Syst. (Kuala Lumpur, Malaysia), 2010, pp. 756-759. https://doi.org/10.1109/APCCAS.2010.5774887   DOI
5 Y. Lu, M. O'Neill, and J. McCanny, Evaluation of random delay insertion against DPA on FPGAs, ACM Trans. Reconfigurable Technol. Syst. 4 (2010), no. 1, 1-20. https://doi.org/10.1145/1857927.1857938   DOI
6 I. Levi, O. Keren, and A. Fish, Data-dependent delays as a barrier against power attacks, IEEE Trans. Circ. Syst.I: Regular Pap. 62 (2015), no. 8, 2069-2078. https://doi.org/10.1109/TCSI.2015.2452371   DOI
7 S. Mangard, E. Oswald, and T. Popp, Power analysis attacks: Revealing the secrets of smart cards, Springer, Berlin, Germany, 2008.
8 J. G. van Woudenberg, M. F. Witteman, and B. Bakker, Improving differential power analysis by elastic alignment, in Proc. Cryptographers Track RSA Conf.: Topics Cryptology (San Francisco, CA, USA), 2011, pp. 104-119. https://doi.org/10.1007/978-3-642-19074-2_8   DOI
9 R. A. Muijrers, J. G. van Woudenberg, and L. Batina, RAM: Rapid alignment method, in Proc. Int. Conf. Smart Card Research Adv. Applicat, (Leuven, Belgium), 2011, pp. 266-282. https://doi.org/10.1007/978-3-642-27257-8_17   DOI
10 S. Nagashima, N. Homma, Y. Imai, T. Aoki, and A. Satoh, DPA using phase-based waveform matching against randomdelay countermeasure, in Proc. IEEE Int. Symp. Circuits Syst. (New Orleans, LA, USA), 2007, pp. 1807-1810. https://doi.org/10.1109/ISCAS.2007.378024   DOI
11 E. Cagli, C. Dumas, and E. Prouff, Convolutional neural networks with data augmentation against jitter-based counter-measures, in Proc. Int. Conf. Cryptographic Hardw. Embedded Syst. (Taipei, Taiwan), 2017, pp. 45-68. https://doi.org/10.1007/978-3-319-66787-4_3   DOI
12 O. Schimmel, P. Duplys, E. Boehl, J. Hayek, R. Bosch, and W. Rosenstiel, Correlation power analysis in frequency domain, in Proc. COSADE 1st Int. Workshop Constructive SideChannel Anal. Secure Design, 2010, pp. 1-3.
13 F. Zhang, X. Dong, B. Yang, Y. Zhou, and K. Ren, A systematic evaluation of wavelet-based attack framework on random delay countermeasures, IEEE Trans. Inform. Forensics. Secur. 15 (2019), 1407-1422. https://doi.org/10.1109/TIFS.2019.2941774   DOI
14 D. B. Percival and A. T. Walden, Wavelet methods for time series analysis, Vol. 4, Cambridge University Press, 2006.
15 M. Bucci, R. Luzzi, M. Guglielmo, and A. Trifiletti, A counter-measure against differential power analysis based on random delay insertion, in Proc.. IEEE Int. Symp. Circ. Syst. (Kobe, Japan), 2005, pp. 3547-3550. https://doi.org/10.1109/ISCAS.2005.1465395   DOI
16 C. Clavier, J. S. Coron, and N. Dabbous, Differential power analysis in the presence of hardware countermeasures, in Proc. Int. Workshop Cryptographic Hardw. Embedded Syst. (Worcester, MA, USA), 2000, pp. 252-263. https://doi.org/10.1007/3-540-44499-8_20   DOI
17 J. S. Coron, and I. Kizhvatov, An efficient method for random delay generation in embedded software, in Proc. Int. Workshop Cryptographic Hardw. Embedded Syst. (Lausanne, Switzerland), 2009, pp. 156-170. https://doi.org/10.1007/978-3-642-04138-9_12   DOI