2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2015
DOI: 10.1109/hst.2015.7140239
|View full text |Cite
|
Sign up to set email alerts
|

Power analysis of the t-private logic style for FPGAs

Abstract: The goal of t-private circuits is to protect information processed by the circuit. This work presents the first practical power analysis evaluation of t-private logic style for FPGAs. Following the synthesis technique introduced at HOST 2012, a t-private S-box of the Present block cipher is synthesized and analyzed with respect to side channel leakage. The analysis is performed on simulated power traces as well as real power measurements taken from an implementation on a Virtex 5 FPGA. Classical Correlation po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…They stated that glitches contributed significant power consumption and showed how such glitches weaken the security of private circuits. Later, in [ 10 ], Zachary et al. showed a practical power analysis attack using correlation enhanced collision attack.…”
Section: Introductionmentioning
confidence: 99%
“…They stated that glitches contributed significant power consumption and showed how such glitches weaken the security of private circuits. Later, in [ 10 ], Zachary et al. showed a practical power analysis attack using correlation enhanced collision attack.…”
Section: Introductionmentioning
confidence: 99%
“…The resulting implementations were later shown to have security flaws [28]. At ICCD 2015, Roy et al [29], pointed out the reasons for the existent side-channel leakage.…”
Section: Introductionmentioning
confidence: 99%
“…By practical evaluation, we mean any standard cipher, implemented by private circuit and tested against SCA, which is the focal point of the present paper. In a recent work [13], t-private implementation of PRESENT with t = 1 was tested. Authors analyze a straightforward implementation of t-private PRESENT to fail against against CPA and correlation-enhanced collison attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Authors analyze a straightforward implementation of t-private PRESENT to fail against against CPA and correlation-enhanced collison attacks. Although the practical analysis presented in [13] is detailled, authors fail to explain the phenomena which causes side-channel leakage. The countermeasure, proposed in [1] is based on sound theoretical proof but with some inherent assumptions which may not be valid in practical scenario.…”
Section: Introductionmentioning
confidence: 99%