1. Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips
- Author
-
Naghmeh Karimi, Farzad Niknia, Sylvain Guilley, Jean-Luc Danger, Département Communications & Electronique (COMELEC), Télécom ParisTech, Secure and Safe Hardware (SSH), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, and Institut Mines-Télécom [Paris] (IMT)-Télécom Paris
- Subjects
Profiling (computer programming) ,Focus (computing) ,business.industry ,Computer science ,02 engineering and technology ,Computer Graphics and Computer-Aided Design ,[SPI.TRON]Engineering Sciences [physics]/Electronics ,020202 computer hardware & architecture ,Process variation ,Power analysis ,Cipher ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Electrical and Electronic Engineering ,business ,ComputingMilieux_MISCELLANEOUS ,Software ,Hot-carrier injection ,Leakage (electronics) - Abstract
Profiling side-channel attacks in which an adversary creates a “profile” of a sensitive device and uses such profile to model a target device with similar implementation has received the lion’s share of attention in the recent years. In particular, template attacks are known to be the most powerful profiling side-channel attacks from an information theoretic point of view. When launching such attack, the adversary first builds a model based on the leakage of the profiling (training) device in his disposal which is then exploited in the second phase of the attack (i.e., matching) to extract the key from the target device. Discrepancies between the device used for modeling and the target device affect the attack success. The effect of process variation and temperature misalignment between the profiling and target devices in the template attack’s success has been studied extensively in literature, while the impact of device aging on the template attack’s success is yet to be investigated thoroughly. This paper moves one step forward and studies the impact of device aging, mainly Bias temperature Instability (BTI) and Hot Carrier Injection (HCI), in the devices that have been protected against power analysis attacks via dual rail logics. In particular, we focus on the Wave Dynamic Differential Logic (WDDL) circuits, and via extensive transistor-level simulations we will show how device aging misalignments between the profiling and target devices can hinder template attacks for both unprotected and WDDL protected counterparts. We mounted several attacks on the PRESENT cipher, with and without WDDL protection, at different temperatures and aging times. Our results shows that the attack is more difficult if there is an aging-duration mismatch between the training and target devices, and the attack-efficiency decrease is especially significant for mismatches of few weeks.
- Published
- 2022
- Full Text
- View/download PDF