Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach

  • Authors:
  • Shengqi Yang;Wayne Wolf;N. Vijaykrishnan;D. N. Serpanos;Yuan Xie

  • Affiliations:
  • Princeton University, NJ;Princeton University, NJ;The Penn State University, University Park, PA;Patras University, Greece;The Penn State University, University Park, PA

  • Venue:
  • Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques that can protect cryptosystems from leaking information have been studied by several groups. Power attacks, which infer program behavior from observing power supply current into a processor core, are important forms of attacks. Various methods have been proposed to countermeasure the popular and efficient power attacks. However, these methods do not adequately protect against power attacks and may introduce new vulnerabilities. In this work, we addressed a novel approach against the power attacks, i.e., Dynamic Voltage and Frequency Switching (DVFS). Three designs, naive, improved and advanced implementations, have been studied to test the efficiency of DVFS against power attacks. A final advanced realization of our novel cryptosystem was given out, which achieved enough high power trace entropy and time trace entropy to block all kinds of power attacks, with 27% energy reduction and 16% time overhead for DES encryption and decryption algorithms.