Cryptology ePrint Archive: Report 2022/129
TOFU - Toggle Count Analysis made simple
Michael Gruber and Georg Sigl
Abstract: Protection against physical attacks is a major requirement for cryptographic implementations running on devices which are accessible to an attacker. Side-channel attacks are the most common types of physical attacks, the most frequent side-channel is the device's power consumption. In this work we propose a novel open-source tool called TOFU which synthesizes VCD simulation traces into power traces, with adjustable leakage models. Additionally, we propose a workflow which is only based on open-source tools. The functionality of TOFU and the proposed workflow was verified by a CPA of a AES hardware implementation. We also provide numbers for the required running time of TOFU for a trace synthesis with respect to the according VCD file size. Furthermore, we provide TOFU's source code.
Category / Keywords: applications / Toggle Count Analysis, AES, CPA
Date: received 4 Feb 2022, last revised 13 Feb 2022
Contact author: m gruber at tum de, sigl at tum de
Available format(s): PDF | BibTeX Citation
Version: 20220213:130002 (All versions of this report)
Short URL: ia.cr/2022/129
[ Cryptology ePrint archive ]