Cryptology ePrint Archive: Report 2015/199

Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs

Amir Moradi and Gesine Hinterwälder

Abstract: By shrinking the technology and reducing the energy requirements of integrated circuits, producing ultra-low-power devices has practically become possible. Texas Instruments as a pioneer in developing FRAM-based products announced a couple of different microcontroller (MCU) families based on the low-power and fast Ferroelectric RAM technology. Such MCUs come with embedded cryptographic module(s) as well as the assertion that - due to the underlying ultra-low-power technology - mounting successful side-channel analysis (SCA) attacks has become very difficult. In this work we practically evaluate this claimed hardness by means of state-of-the-art power analysis attacks. The leakage sources and corresponding attacks are presented in order to give an overview on the potential risks of making use of such platforms in security-related applications. In short, we partially confirm the given assertion. Some modules, e.g., the embedded cryptographic accelerator, can still be attacked but with slightly immoderate effort. On the contrary, the other leakage sources are easily exploitable leading to straightforward attacks being able to recover the secrets.

Category / Keywords: implementation / side-channel analysis, FRAM, AES

Original Publication (in the same form): COSADE 2015

Date: received 4 Mar 2015

Contact author: amir moradi at rub de

Available format(s): PDF | BibTeX Citation

Version: 20150304:182500 (All versions of this report)

Short URL: ia.cr/2015/199

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]