Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow

  • Authors:
  • Shivam Bhasin;Jean-Luc Danger;Florent Flament;Tarik Graba;Sylvain Guilley;Yves Mathieu;Maxime Nassar;Laurent Sauvage;Nidhal Selmane

  • Affiliations:
  • -;-;-;-;-;-;-;-;-

  • Venue:
  • RECONFIG '09 Proceedings of the 2009 International Conference on Reconfigurable Computing and FPGAs
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customarily employed by malevolent adversaries: observation and differential perturbation attacks, also called SCA and DFA in the abundant scientific literature on this topic. Numerous research efforts have been carried out to defeat respectively SCA or DFA. However, few publications deal with concomitant protection against both threats. The current consensus is to devise algorithmic countermeasures to DFA and subsequently to synthesize the DFA-protected design thanks to a DPA-resistant CAD flow. In this article, we put to the fore that this approach is the best neither in terms of performance nor of relevance. Notably, the contribution of this paper is to demonstrate that the strongest SCA countermeasure known so far, namely the dual-rail with precharge logic styles that do not evaluate early, happen surprisingly to be almost natively immune to most DFAs. Therefore, unexpected two-in-one solutions against SCA and DFA indeed exist and deserve a closer attention, because they ally simplicity with efficiency. In particular, we illustrate a logic style, called WDDL without early evaluation (WDDL w/o EE), and a design flow that realizes in practice one possible combined DPA and DFA counter-measure especially suited for reconfigurable hardware.