Cryptology ePrint Archive: Report 2010/272
Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
Zhimin Chen and Patrick Schaumont
Abstract: This paper discusses a novel direction for multicore cryptographic
software, namely the use of multicore to protect a design against
side-channel attacks. We present a technique which is based on the
principle of dual-rail pre-charge, but which can be completely
implemented in software. The resulting protected software is called
a Virtual Secure Circuit (VSC). Similar to the dual-rail pre-charge
technique, a VSC executes as two complementary programs on two
identical processor cores. Our key contributions include (1) the
analysis of the security properties of a VSC, (2) the construction
of a VSC AES prototype on a dual-PowerPC architecture, (3) the
demonstration of VSC's protection effectiveness with real
side-channel attack experiments. The attack results showed that the
VSC protected AES needs 80 times more measurements than the
unprotected AES to find the first correct key byte. Even one million
measurements were not sufficient to fully break VSC protected AES,
while unprotected AES was broken using only 40000 measurements. We
conclude that VSC can provide a similar side-channel resistance as
WDDL, the dedicated hardware equivalent of dual-rail pre-charge.
However, in contrast to WDDL, VSC is a software technique, and
therefore it is flexible.
Category / Keywords: implementation / Side-Channel Attack
Date: received 10 May 2010
Contact author: chenzm at vt edu
Available formats: PDF | BibTeX Citation
Version: 20100511:202619 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]