Browse > Article
http://dx.doi.org/10.6109/jkiice.2015.19.6.1283

Design of a Multi Dielectric Coating against Non-invaisive Attack  

Kim, Tae-Yong (Division of Computer Engineering, Dongseo University)
LEE, HoonJae (Division of Computer Engineering, Dongseo University)
Abstract
In general, IC chip circuit which is operating a cryptographic computation tends to radiate stronger electromagnetic signal to the outside. By using a power detecter such as a loop antenna near cryptographic device, the encryption key can be identified by probing a electromagnetic signal. To implement a method against non-invasive type attack, multi dielectric slab structure on IC chip to suppress radiated electromagnetic signal was introduced. Multiple dielectric slab was implemented by suitably configured to have the Bragg reflection characteristics, and then the reflection response was computed and verified its effectiveness. As a result, the thickness of the dielectric coating was 2mm and the reflection response characteristics for the vertical incidence was achieved to be 91% level.
Keywords
Bragg reflective; Dielectric coating; PUF; Reflection response;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Tae Yong Kim and Hoon-Jae Lee, "Reflection characterics from multiple dielectric slabs for PUF modeling," in Proceeding of the Korea Institute of Information and Communication Engineering, vol. 19, no. 1, pp. 211, 2015.
2 Sophocles J. Orfanidis, Electromagnetic waves and antenans, No Published ed., 2014.
3 D. M. Pozar, Micro Engineering, Addison-Wesley Pub., 1990.
4 Matthew N. O. Sadiku, Numerical techniques in electromagnetics (2nd ed.), CRC Press.
5 F. A. Jenkins and H. E. White, Fundamentals of Optics, 4th ed. Singapore: McGraw-Hill, 1976.
6 NXP Semiconductors offical site. PUF-Physically Unclonable Functions [Internet]. Available: http://www.nxp.com/.
7 Young Jin Kang et al., "An Experimental CPA Attack for Arduino Cryptographic Module and Analysis in Softwarebased CPA Countermeasures", International Journal of Security and Its Applications, Vol. 8, No.2, pp. 261-270, Apr. 2014.   DOI
8 Tae Yong Kim and Hoon-Jae Lee, "Source identification in 2-dimensional scattering field based on inverse problem," Journal of the Korea Institute of Information and Communication Engineering, Vol. 18, No. 6, pp. 1262-1268, 2014.   DOI
9 Sergei P. Skorobogatov, "Semi-invasive attacks-A new approach to hardware security analysis," University of Cambridge, Technical Report No. 630(UCAM-CL-TR-630), 2005.