Cargando…

An Evaluation of Power Side-Channel Resistance for RNS Secure Logic

In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values. Most existing countermeasures enhance side-channel privacy by ma...

Descripción completa

Detalles Bibliográficos
Autores principales: Selvam, Ravikumar, Tyagi, Akhilesh
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8949024/
https://www.ncbi.nlm.nih.gov/pubmed/35336411
http://dx.doi.org/10.3390/s22062242
_version_ 1784674795240030208
author Selvam, Ravikumar
Tyagi, Akhilesh
author_facet Selvam, Ravikumar
Tyagi, Akhilesh
author_sort Selvam, Ravikumar
collection PubMed
description In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values. Most existing countermeasures enhance side-channel privacy by making the power trace statistically indistinguishable. The proposed RNS logic provides cryptographic privacy that also offers side-channel resistance. It also offers side-channel privacy by mapping different input bit values into similar bit encodings for the shares. This property is also captured as a symmetry measure in the paper. This side-channel resistance of the RNS secure logic is evaluated analytically and empirically. An analytical metric is developed to capture the conditional probability of the input bit state given the residue state visible to the adversary, but derived from hidden cryptographic secrets. The transition probability, normalized variance, and Kullback–Leibler (KL) divergence serve as side-channel metrics. The results show that our RNS secure logic provides better resistance against high-order side-channel attacks both in terms of power distribution uniformity and success rates of machine learning (ML)-based power side-channel attacks. We performed SPICE simulations on Montgomery modular multiplication and Arithmetic-style modular multiplication using the FreePDK 45 nm Technology library. The simulation results show that the side-channel security metrics using KL divergence are 0.0204 for Montgomery and 0.0020 for the Arithmetic-style implementation. This means that Arithmetic-style implementation has better side-channel resistance than the Montgomery implementation. In addition, we evaluated the security of the AES encryption with RNS secure logic on a Spartan-6 FPGA Board. Experimental results show that the protected AES circuit offers 79% higher resistance compared to the unprotected AES circuit.
format Online
Article
Text
id pubmed-8949024
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-89490242022-03-26 An Evaluation of Power Side-Channel Resistance for RNS Secure Logic Selvam, Ravikumar Tyagi, Akhilesh Sensors (Basel) Article In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values. Most existing countermeasures enhance side-channel privacy by making the power trace statistically indistinguishable. The proposed RNS logic provides cryptographic privacy that also offers side-channel resistance. It also offers side-channel privacy by mapping different input bit values into similar bit encodings for the shares. This property is also captured as a symmetry measure in the paper. This side-channel resistance of the RNS secure logic is evaluated analytically and empirically. An analytical metric is developed to capture the conditional probability of the input bit state given the residue state visible to the adversary, but derived from hidden cryptographic secrets. The transition probability, normalized variance, and Kullback–Leibler (KL) divergence serve as side-channel metrics. The results show that our RNS secure logic provides better resistance against high-order side-channel attacks both in terms of power distribution uniformity and success rates of machine learning (ML)-based power side-channel attacks. We performed SPICE simulations on Montgomery modular multiplication and Arithmetic-style modular multiplication using the FreePDK 45 nm Technology library. The simulation results show that the side-channel security metrics using KL divergence are 0.0204 for Montgomery and 0.0020 for the Arithmetic-style implementation. This means that Arithmetic-style implementation has better side-channel resistance than the Montgomery implementation. In addition, we evaluated the security of the AES encryption with RNS secure logic on a Spartan-6 FPGA Board. Experimental results show that the protected AES circuit offers 79% higher resistance compared to the unprotected AES circuit. MDPI 2022-03-14 /pmc/articles/PMC8949024/ /pubmed/35336411 http://dx.doi.org/10.3390/s22062242 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Selvam, Ravikumar
Tyagi, Akhilesh
An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
title An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
title_full An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
title_fullStr An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
title_full_unstemmed An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
title_short An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
title_sort evaluation of power side-channel resistance for rns secure logic
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8949024/
https://www.ncbi.nlm.nih.gov/pubmed/35336411
http://dx.doi.org/10.3390/s22062242
work_keys_str_mv AT selvamravikumar anevaluationofpowersidechannelresistanceforrnssecurelogic
AT tyagiakhilesh anevaluationofpowersidechannelresistanceforrnssecurelogic
AT selvamravikumar evaluationofpowersidechannelresistanceforrnssecurelogic
AT tyagiakhilesh evaluationofpowersidechannelresistanceforrnssecurelogic