A Novel Countermeasure Enhancing Side Channel Immunity in FPGAs

  • Authors:
  • Y. Zafar;D. Har

  • Affiliations:
  • -;-

  • Venue:
  • ENICS '08 Proceedings of the 2008 International Conference on Advances in Electronics and Micro-electronics
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Side channel attacks (SCAs) are very effective in extracting information from algorithmically secure systems. Since, the earliest reports of attacks exploiting side channels such as power consumption, timing behavior and electromagnetic radiation etc., the countermeasures to resist such attacks have also been proposed. FPGAs originally thought to be resistant to such attacks because of some inherent characteristics were also found to leak information over the side channels. Overtime, SCA countermeasures have been proposed that continue to fade away as resistant attack techniques are developed. In this article an FPGA implementation of a multi–clock system with cipher embodiment, incorporating a novel countermeasure to resist SCAs, is presented. The proposed methodology of embedding single inverter ring oscillators (SIROs) within the synchronous cores helps improve immunity against electromagnetic, fault and glitch attacks, while the introduction of frequency hopping by randomly varying frequency driving the cipher hardens the system against power and timing attacks. The incorporated countermeasure enhances the immunity of FPGA based implementation against multiple types of SCAs without adversely affecting cost or performance.