Title | ||
---|---|---|
Power Consumption Versus Hardware Security: Feasibility Study Of Differential Power Attack On Linear Feedback Shift Register Based Stream Ciphers And Its Countermeasures |
Abstract | ||
---|---|---|
This paper demonstrates a trade off between the security of a crypto-system and its power consumption. Digital stream ciphers are extensively employed in Crypto-systems. Many of them use linear feedback shift registers (LFSRs) as building blocks, wherein, an n-degree primitive connection polynomial is used as a feedback function to realize an n-bit LFSR. Using finite-field theory and electromagnetic-circuit theory, we show that such LFSRs are susceptible to differential power attacks (DPAs), without the adversary's prior knowledge of the primitive polynomial. It is interesting to note that the DPA becomes more prominent with technology scaling due to increased contribution of local interconnect to total power. The paper also presents two countermeasures for the proposed DPA that results in a trade off with power consumption. With the growing need for crypto-systems in low-power Internet-of-Things (IoTs) devices, this case study highlighting a power-security trade off is of great significance. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1166/jolpe.2016.1434 | JOURNAL OF LOW POWER ELECTRONICS |
Keywords | Field | DocType |
Linear Feed Back Shift Registers, Differential Power Attacks, Dynamic Power Dissipation, Charge Conservation, Gauss's Law | Countermeasure,Linear feedback shift register,Hardware security module,Computer science,Real-time computing,Stream cipher,Power consumption,Embedded system,Power attack | Journal |
Volume | Issue | ISSN |
12 | 2 | 1546-1998 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sanjay Burman | 1 | 19 | 2.99 |
Seetal Potluri | 2 | 15 | 8.46 |
Debdeep Mukhopadhyay | 3 | 921 | 123.07 |
Kamakoti Veezhinathan | 4 | 35 | 4.04 |