Abstract
Several dual-rail logic styles make use of single-rail flip-flops for storing intermediate states. We show that single mask bits, as applied by various side-channel resistant logic styles such as MDPL and iMDPL, are not sufficient to obfuscate the remaining leakage of single-rail flip-flops.
By applying simple models for the leakage of masked flip-flops, we design a new attack on circuits implemented using masked single-rail flip-flops. Contrary to previous attacks on masked logic styles, our attack does not predict the mask bit and does not need detailed knowledge about the attacked device, e.g., the circuit layout. Moreover, our attack works even if all the load capacitances of the complementary signals are perfectly balanced and even if the PRNG is ideally unbiased. Finally, after performing the attack on DRSL, MDPL, and iMDPL circuits we show that single-bit masks do not influence the exploitability of the revealed leakage of the masked flip-flops.
By applying simple models for the leakage of masked flip-flops, we design a new attack on circuits implemented using masked single-rail flip-flops. Contrary to previous attacks on masked logic styles, our attack does not predict the mask bit and does not need detailed knowledge about the attacked device, e.g., the circuit layout. Moreover, our attack works even if all the load capacitances of the complementary signals are perfectly balanced and even if the PRNG is ideally unbiased. Finally, after performing the attack on DRSL, MDPL, and iMDPL circuits we show that single-bit masks do not influence the exploitability of the revealed leakage of the masked flip-flops.
| Originalsprache | Englisch |
|---|---|
| Titel | Information, Security and Cryptology -- ICISC 2009 |
| Redakteure/-innen | Donghoon Lee, Seokhie Hong |
| Seitenumfang | 15 |
| Band | 5984 |
| Erscheinungsort | Berlin, Heidelberg |
| Herausgeber (Verlag) | Springer Berlin Heidelberg |
| Erscheinungsdatum | 12.2010 |
| Seiten | 146-160 |
| ISBN (Print) | 978-3-642-14422-6 |
| ISBN (elektronisch) | 978-3-642-14423-3 |
| DOIs | |
| Publikationsstatus | Veröffentlicht - 12.2010 |
| Veranstaltung | 12th International Conference on Information Security and Cryptology - Seoul, Südkorea Dauer: 02.12.2009 → 04.12.2009 |
UN SDGs
Dieser Output leistet einen Beitrag zu folgendem(n) Ziel(en) für nachhaltige Entwicklung
-
SDG 9 – Industrie, Innovation und Infrastruktur
-
SDG 11 – Nachhaltige Städte und Gemeinschaften
-
SDG 12 – Verantwortungsvoller Konsum und Produktion
Fingerprint
Untersuchen Sie die Forschungsthemen von „Power Analysis of Single-Rail Storage Elements as Used in MDPL“. Zusammen bilden sie einen einzigartigen Fingerprint.Zitieren
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver