Paper 2023/047

Side-Channel Resistant Implementation Using Arbiter PUF

Raja Adhithan RadhaKrishnan
Abstract

The goals of cryptography are achieved using mathematically strong crypto-algorithms, which are adopted for securing data and communication. Even though the algorithms are mathematically secure, the implementation of these algorithms may be vulnerable to side-channel attacks such as timing and power analysis attacks. One of the effective countermeasures against such attacks is Threshold Implementation(TI). However, TI realization in crypto-device introduces hardware complexity, so it shall not be suitable for resource-constrained devices. Therefore, there is a need for efficient and effective countermeasure techniques for resource-constrained devices. In this work, we propose a lightweight countermeasure using an Arbiter Physical Unclonable Function (A-PUF) to obfuscate intermediate values in the register for rolled and unrolled implementation of Advanced Encryption Standard (AES). The countermeasure is realized in rolled (iterative) implementation of AES in a 65nm Field Programmable Gate Array (FPGA). We have analyzed the security strength and area of the obfuscated AES using A-PUF and compared it with conventional (rolled AES) and masked TI of AES. Further, we have illustrated the effectiveness of pre-charge and neutralizing countermeasures to strengthen the side channel resistance. We have discussed the complexity of mounting a side channel and modeling attacks on obfuscated AES using A-PUF.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Side-channel attacksCountermeasuresobfuscatingPUFAESMaskingTITVLAPre-chargeNeutralizing.
Contact author(s)
r rajaadhithan @ gmail com
History
2023-01-19: approved
2023-01-16: received
See all versions
Short URL
https://ia.cr/2023/047
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/047,
      author = {Raja Adhithan RadhaKrishnan},
      title = {Side-Channel Resistant Implementation Using Arbiter PUF},
      howpublished = {Cryptology ePrint Archive, Paper 2023/047},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/047}},
      url = {https://eprint.iacr.org/2023/047}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.