test apparatus for side channel resistance compliance
play

Test Apparatus for Side-Channel Resistance Compliance Testing - PowerPoint PPT Presentation

Institute for Applied Information Processing and Communications (IAIK) Test Apparatus for Side-Channel Resistance Compliance Testing Michael Hutter, Mario Kirschbaum, Thomas Plos, Jrn-Marc Schmidt NIAT Workshop 2011 Institute for Applied


  1. Institute for Applied Information Processing and Communications (IAIK) Test Apparatus for Side-Channel Resistance Compliance Testing Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt NIAT Workshop 2011 Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology TU Graz/Computer Science/IAIK/VLSI/Name TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 Project 1 1

  2. Institute for Applied Information Processing and Communications (IAIK) What is this talk about? � Challenge � How to quantify side-channel resistance? � How to estimate the security level? � How to perform SCA compliance testing? � Proposal � Non-invasive attack testing apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 2

  3. Institute for Applied Information Processing and Communications (IAIK) ISO/IEC 10373-6 TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 3

  4. Institute for Applied Information Processing and Communications (IAIK) The Classical SCA Setup GND 1 meas 1 GND TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 4

  5. Institute for Applied Information Processing and Communications (IAIK) The Proposed Apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 5

  6. Institute for Applied Information Processing and Communications (IAIK) What are the Advantages? 1. Reduction of noise 2. Higher measurement sensitivity TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 6

  7. Institute for Applied Information Processing and Communications (IAIK) The AT89S8253 Apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 7

  8. Institute for Applied Information Processing and Communications (IAIK) The ATmega128 Apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 8

  9. Institute for Applied Information Processing and Communications (IAIK) The GRANDESCA Apparatus TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 9

  10. Institute for Applied Information Processing and Communications (IAIK) TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 10

  11. Institute for Applied Information Processing and Communications (IAIK) TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 11

  12. Institute for Applied Information Processing and Communications (IAIK) Attack Scenarios 1. White-box evaluation � Target: MOV operation 2. Black-box evaluation � Target: 1st S-box output of an AES-128 encryption (round 1) � IC 1 : random input � IC 2 : zero input TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 12

  13. Institute for Applied Information Processing and Communications (IAIK) Results of Attacks Reference Attack Difference Attack σ = 0.96 σ = 0.67 TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 13

  14. Institute for Applied Information Processing and Communications (IAIK) AES Results TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 14

  15. Institute for Applied Information Processing and Communications (IAIK) Summary � Using two devices improves attack � Less noise � Better acquisition resolution � Can be used for � Device characterization, profiling, countermeasure evaluation, SCA-resistance tests, compliance testing, attacks, … Michael Hutter IAIK – Graz University of Technology michael.hutter@iaik.tugraz.at www.iaik.tugraz.at TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 15

  16. Institute for Applied Information Processing and Communications (IAIK) The Wheatstone Bridge TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 16

  17. Institute for Applied Information Processing and Communications (IAIK) Signal-to-Noise Ratio Reference Attack Difference Attack TU Graz/Computer Science/IAIK/SEnSE Nara, 27.09.2011 NIAT 2011 17

Recommend


More recommend