Paper 2025/1130

An Open-Source Framework for Efficient Side-Channel Analysis on Cryptographic Implementations

Takuya Kojima, University of Tsukuba
Masaki Morita, The University of Tokyo
Hideki Takase, The University of Tokyo
Hiroshi Nakamura, The University of Tokyo
Abstract

Side-channel attacks are increasingly recognized as a significant threat to hardware roots of trust. As a result, cryptographic module designers must ensure that their modules are resilient to such attacks before deployment. However, efficient evaluation of side-channel vulnerabilities in cryptographic implementations remains challenging. This paper introduces an open-source framework integrating FPGA designs, power measurement tools, and high-performance side-channel analysis libraries to streamline the evaluation process. The framework provides design templates for two widely used FPGA boards in the side-channel analysis community, enabling Shell-Role architecture, a modern FPGA design pattern. This shell abstraction allows designers to focus on developing cryptographic modules while utilizing standardized software tools for hardware control and power trace acquisition. Additionally, the framework includes acceleration plugins for ChipWhisperer, the leading open-source side-channel analysis platform, to enhance the performance of correlation power analysis (CPA) attacks. These plugins exploit modern many-core processors and Graphics Processing Units (GPUs) to speed up analysis significantly. To showcase the capabilities of the proposed framework, we conducted multiple case studies and highlighted significant findings that advance side-channel research. Furthermore, we compare our CPA plugins with existing tools and show that our plugins achieve up to 8.60x speedup over the state-of-the-art CPA tools.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Side-channel attackHardware securityGPU accelerationOpen-source frameworkFPGA design
Contact author(s)
tkojima @ lila cs tsukuba ac jp
History
2025-06-17: approved
2025-06-16: received
See all versions
Short URL
https://ia.cr/2025/1130
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/1130,
      author = {Takuya Kojima and Masaki Morita and Hideki Takase and Hiroshi Nakamura},
      title = {An Open-Source Framework for Efficient Side-Channel Analysis on Cryptographic Implementations},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/1130},
      year = {2025},
      url = {https://eprint.iacr.org/2025/1130}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.