[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2015/727

DPA, Bitslicing and Masking at 1 GHz

Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, and Ingrid Verbauwhede

Abstract

We present DPA attacks on an ARM Cortex-A8 processor running at 1 GHz. This high-end processor is typically found in portable devices such as phones and tablets. In our case, the processor sits in a single board computer and runs a full-fledged Linux operating system. The targeted AES implementation is bitsliced and runs in constant time and constant flow. We show that, despite the complex hardware and software, high clock frequencies and practical measurement issues, the implementation can be broken with DPA starting from a few thousand measurements of the electromagnetic emanation of a decoupling capacitor near the processor. To harden the bitsliced implementation against DPA attacks, we mask it using principles of hardware gate-level masking. We evaluate the security of our masked implementation against first-order and second-order attacks. Our experiments show that successful attacks require roughly two orders of magnitude more measurements.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
A minor revision of an IACR publication in CHES 2015
Keywords
side-channel analysisDPAARM Cortex-A8bitslicinggate-level masking
Contact author(s)
josep balasch @ esat kuleuven be
History
2015-07-21: received
Short URL
https://ia.cr/2015/727
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/727,
      author = {Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede},
      title = {{DPA}, Bitslicing and Masking at 1 {GHz}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/727},
      year = {2015},
      url = {https://eprint.iacr.org/2015/727}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.