Cryptology ePrint Archive: Report 2014/307

Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks

Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni

Abstract: A sound design time evaluation of the security of a digital device is a goal which has attracted a great amount of research effort lately. Common security metrics for the attack consider either the theoretical leakage of the device, or assume as a security metric the number of measurements needed in order to be able to always recover the secret key. In this work we provide a combined security metric taking into account the computational effort needed to lead the attack, in combination with the quantity of measurements to be performed, and provide a practical lower bound for the security margin which can be employed by a secure hardware designer. This paper represents a first exploration of a design-time security metric incorporating the computational effort required to lead a power- based side channel attack in the security level assessment of the device. We take into account in our metric the possible presence of masking and hiding schemes, and we assume the best measurement conditions for the attacker, thus leading to a conservative estimate of the security of the device. We provide a practical validation of our security metric through an analysis of transistor-level accurate power simulations of a 128-bit AES core implemented on a 65 nm library.

Category / Keywords: implementation / AES, Side-channel analysis

Original Publication (in the same form): 7th Workshop on Embedded Systems Security (WESS 2012)

Date: received 30 Apr 2014

Contact author: alessandro barenghi at polimi it

Available format(s): PDF | BibTeX Citation

Version: 20140430:210914 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]