Cryptology ePrint Archive: Report 2017/413
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
Abstract: Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are considered potential candidates for implementing low-power, high density storage systems. The vulnerability of such nonvolatile memory (NVM) based cryptosystems to standard side-channel attacks must be thoroughly assessed before deploying them in practice. In this paper, we outline a generic Correlation Power Analysis (CPA) attack strategy against STT-MRAM based cryptographic designs using a new power model. In our proposed attack methodology, an adversary exploits the power consumption patterns during the write operation of an STT-MRAM based cryptographic implementation to successfully retrieve the secret key. In order to validate our proposed attack technique, we mounted a CPA attack on MICKEY-128 2.0 stream cipher design consisting of STT-MRAM cells with Magnetic Tunnel Junctions (MTJs) as storage elements. The results of the experiments show that the STT-MRAM based implementation of the cipher circuit
is susceptible to standard differential power analysis attack
strategy provided a suitable hypothetical power model (such
as the one proposed in this paper) is selected. In addition, we
also investigated the effectiveness of state-of-the-art side-channel attack countermeasures for MRAMs and found that our proposed scheme is able to break such protected implementations as well.
Category / Keywords: Correlation power analysis attack, Spin-transfer torque magnetic RAM, MICKEY-128 2.0 stream cipher
Original Publication (with major differences): IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2017
Date: received 11 May 2017, last revised 13 May 2017
Contact author: abhi1990 at terpmail umd edu
Available format(s): PDF | BibTeX Citation
Version: 20170514:132310 (All versions of this report)
Short URL: ia.cr/2017/413
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]