Evaluation of the Masked Logic Style MDPL on a Prototype Chip

作者: Thomas Popp , Mario Kirschbaum , Thomas Zefferer , Stefan Mangard

DOI: 10.1007/978-3-540-74735-2_6

关键词: Leakage (electronics)Propagation effectComputer scienceLogic styleEmbedded systemMicrocontrollerChip

摘要: MDPL has been proposed as a masked logic style that counteracts DPA attacks. Recently, it shown the so-called "early propagation effect" might reduce security of this significantly. In light these findings, 0.13 μmprototype chip includes implementation an 8051-compatible microcontroller in analyzed. Attacks on measured power traces show severe leakage. paper, results detailed analysis reasons for leakage are presented. Furthermore, proposal is made how to improve with respect identified problems.

参考文章(22)
Stefan Mangard, Elisabeth Oswald, Thomas Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security) Springer-Verlag New York, Inc.. ,(2007)
Wieland Fischer, Berndt M. Gammel, Masking at gate level in the presence of glitches cryptographic hardware and embedded systems. pp. 187- 200 ,(2005) , 10.1007/11545262_14
Thomas Popp, Stefan Mangard, Masked dual-rail pre-charge logic: DPA-resistance without routing constraints cryptographic hardware and embedded systems. pp. 172- 186 ,(2005) , 10.1007/11545262_13
Kris Tiri, Ingrid Verbauwhede, Place and Route for Secure Standard Cell Design smart card research and advanced application conference. ,vol. 153, pp. 143- 158 ,(2004) , 10.1007/1-4020-8147-2_10
Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti, Three-phase dual-rail pre-charge logic cryptographic hardware and embedded systems. pp. 232- 241 ,(2006) , 10.1007/11894063_19
Eric Brier, Christophe Clavier, Francis Olivier, Correlation Power Analysis with a Leakage Model Lecture Notes in Computer Science. pp. 16- 29 ,(2004) , 10.1007/978-3-540-28632-5_2
Zhimin Chen, Yujie Zhou, Dual-rail random switching logic: a countermeasure to reduce side channel leakage cryptographic hardware and embedded systems. pp. 242- 254 ,(2006) , 10.1007/11894063_20
Stefan Mangard, Thomas Popp, Berndt M. Gammel, Side-Channel Leakage of Masked CMOS Gates Lecture Notes in Computer Science. pp. 351- 365 ,(2005) , 10.1007/978-3-540-30574-3_24
Minoru Saeki, Tetsuya Ichikawa, Daisuke Suzuki, Random Switching Logic: A Countermeasure against DPA based on Transition Probability. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 346- ,(2004)
Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet, The “backend duplication” method cryptographic hardware and embedded systems. pp. 383- 397 ,(2005) , 10.1007/11545262_28