Paper 2014/025

Side-Channel Leakage through Static Power – Should We Care about in Practice? –

Amir Moradi

Abstract

By shrinking the technology static power consumption of CMOS circuits is becoming a major concern. In this paper, we present the first practical results of exploiting static power consumption of FPGA-based cryptographic devices in order to mount a key-recovery side-channel attack. The experiments represented here are based on three Xilinx FPGAs built on 65nm, 45nm, and 28nm process technologies. By means of a sophisticated measurement setup and methodology we demonstrate an exploitable information leakage through static power of the underlying FPGAs. The current work highlights the feasibility of side-channel analysis attacks by static power that have been known for years but have not been performed and investigated in practice yet. This is a starting point for further research investigations, and may have a significant impact on the efficiency of DPA countermeasures in the near future.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
A minor revision of an IACR publication in CHES 2014
Keywords
Side-Channel AnalysisStaic Power Consumption
Contact author(s)
amir moradi @ rub de
History
2014-07-08: last of 3 revisions
2014-01-08: received
See all versions
Short URL
https://ia.cr/2014/025
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/025,
      author = {Amir Moradi},
      title = {Side-Channel Leakage through Static Power – Should We Care about in Practice? –},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/025},
      year = {2014},
      url = {https://eprint.iacr.org/2014/025}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.