Tran, T. and Dao, B. and Hoang, T. and Hoang, V. and Pham, C. (2023) Transition Factors of Power Consumption Models for CPA Attacks on Cryptographic RISC-V SoC. IEEE Transactions on Computers. pp. 1-12. ISSN 00189340
Full text not available from this repository. (Upload)Abstract
Physical cryptographic devices are vulnerable to side-channel information leakages during operation. They are widely used in software as well as hardware implementations, ranging from microcontrollers and microprocessors to hardware accelerators in System on Chips (SoCs). Nowadays, cryptographic RISC-V SoCs are becoming the most prominent solution compared to the rest. Cryptographic accelerators provide users with a very high level of flexibility and customization of chips suited to specific applications in these systems. First, this research aims to confirm the effectiveness of the Correlation Power Analysis attack on cryptographic SoCs based on three different power consumption models. In each model, the effectiveness of an attack depends on the transition factor, which is a ratio related to different characteristics of the device's power consumption. Then, we focus on modifying the configuration on the SoC and attacking the AES hardware implementation on these designs. The experimental results show that applying the Switching Distance model brings the highest performance. With our suggested range of transition factors, the number of traces needed to find the secret key can be reduced by 13.35% in the best case. IEEE
Item Type: | Article |
---|---|
Divisions: | Institutes > Institute of System Integration |
Identification Number: | 10.1109/TC.2023.3262926 |
Uncontrolled Keywords: | Computer architecture; Computer hardware; Electric power utilization; Side channel attack, Correlation; Correlation power analyse attack; Power consumption model; Power demands; Register; RISC-V; Side-channel attacks; Software; Systems-on-Chip; Transition factors, System-on-chip |
URI: | http://eprints.lqdtu.edu.vn/id/eprint/10806 |