Title
A Power Analysis Attack Countermeasure Based On Random Data Path Execution For Cgra
Abstract
Side-channel Attack, such as simple power analysis and differential power analysis (DPA), is an efficient method to gather the key, which challenges the security of crypto chips. Side-channel Attack logs the power trace of the crypto chip and speculates the key by statistical analysis. To reduce the threat of power analysis attack, an innovative method based on random execution and register randomization is proposed in this paper. In order to enhance ability against DPA, the method disorders the correspondence between power trace and operands by scrambling the data execution sequence randomly and dynamically and randomize the data operation path to randomize the registers that store intermediate data. Experiments and verification are done on the Sakura-G FPGA platform. The results show that the key is not revealed after even 2 million power traces by adopting the proposed method and only 7.23% slices overhead and 3.4% throughput rate cost is introduced. Compared to unprotected chip, it increases more than 4000x measure to disclosure.
Year
DOI
Venue
2020
10.1587/transinf.2019EDP7308
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
Keywords
DocType
Volume
side-channel attack, reconfigurable architecture, differential power analysis, power trace
Journal
E103D
Issue
ISSN
Citations 
5
1745-1361
0
PageRank 
References 
Authors
0.34
0
5
Name
Order
Citations
PageRank
Wei Ge12111.72
Shenghua Chen200.34
Benyu Liu300.34
min zhu4453.48
Bo Liu565.82