Paper 2024/309

NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack

Prithwish Basu Roy, New York University Abu Dhabi, New York University
Johann Knechtel, New York University Abu Dhabi
Akashdeep Saha, Indian Institute of Technology Kharagpur
Saideep Sreekumar, New York University Abu Dhabi
Likhitha Mankali, New York University Abu Dhabi, New York University
Mohammed Nabeel, New York University Abu Dhabi, New York University
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur
Ramesh Karri, New York University
Ozgur Sinanoglu, New York University Abu Dhabi
Abstract

LoPher brings, for the first time, cryptographic security promises to the field of logic locking in a bid to break the game of cat-and-mouse seen in logic locking. Toward this end, LoPher embeds the circuitry to lock within multiple rounds of a block cipher, by carefully configuring all the S-Boxes. To realize general Boolean functionalities and to support varying interconnect topologies, LoPher also introduces additional layers of MUXes between S-Boxes and the permutation operations. The authors of LoPher claim resilience against SAT-based attacks in particular. Here, we show the first successful attack on LoPher. First, we uncover a significant limitation for LoPher’s key-space configuration, resulting in large numbers of equivalent keys and, thus, a largely simplified search space for attackers in practice. Second, motivated by their well-proven working against ciphers, we employ a power side-channel attack against LoPher. We find that ISCAS-85 benchmarks locked with LoPher can all be broken in few thousands of traces. Finally, we also outline a simple and low-cost countermeasure to render LoPher more secure.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Hardware SecurityIP PiracyLogic LockingSide-channel attack
Contact author(s)
pb2718 @ nyu edu
johann @ nyu edu
akashdeepsaha95 @ gmail com
sds710 @ nyu edu
lm4344 @ nyu edu
mtn2 @ nyu edu
dmcseiitkgp @ gmail com
rkarri @ nyu edu
os22 @ nyu edu
History
2024-02-26: approved
2024-02-23: received
See all versions
Short URL
https://ia.cr/2024/309
License
Creative Commons Attribution-NonCommercial-NoDerivs
CC BY-NC-ND

BibTeX

@misc{cryptoeprint:2024/309,
      author = {Prithwish Basu Roy and Johann Knechtel and Akashdeep Saha and Saideep Sreekumar and Likhitha Mankali and Mohammed Nabeel and Debdeep Mukhopadhyay and Ramesh Karri and Ozgur Sinanoglu},
      title = {NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack},
      howpublished = {Cryptology ePrint Archive, Paper 2024/309},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/309}},
      url = {https://eprint.iacr.org/2024/309}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.