Project Details
Projekt Print View

NaSCA: Nano-Scale Side-Channel Analysis - Physical Security for Next-Generation CMOS ICs

Subject Area Computer Architecture, Embedded and Massively Parallel Systems
Term from 2016 to 2021
Project identifier Deutsche Forschungsgemeinschaft (DFG) - Project number 271752544
 
Final Report Year 2021

Final Report Abstract

The goal of this project was to evaluate and improve the physical security of cryptographic hardware implementations in cutting-edge semiconductor technology. This is an important objective due to the continually increasing number and importance of cyber-physical and security-sensitive embedded systems in our everyday life. Many different applications, including electronic identification with smart cards or phones for banking, traveling and access restriction, as well as security-enabled devices for automotive, medical, smart home and industrial automation purposes, rely on strong and robust cryptography implemented (primarily) in tiny and cheap pieces of hardware. The cryptographic implementations on such devices not only have to be mathematically secure, they also need to withstand attackers that gain physical access to the hardware and may observe its emissions during the execution of cryptographic protocols. One of the main sources of unintentional information leakage in such scenarios is the power consumption of computing devices. Whenever adversaries can measure the power consumption of a cryptographic device during the processing of secret material like cryptographic keys, it is possible to learn information about those secrets. It is well known that the down scaling of chip technology over the past decades has caused significant changes in the power consumption behavior of modern computing devices. In particular, while the dynamic power consumption per logic unit declines due to smaller capacitances and lower supply voltages, the static power consumption intensifies in newer technology generations due to lower threshold voltages, shorter channel lengths and thinner gate oxides. Due to these contrary trends it is required to shift at least a part of the focus from the dynamic power consumption to the static power consumption when evaluating the side-channel security of embedded devices in nanometer technologies. This project tried to make a first step in that direction by designing and manufacturing test chips in 90 nm, 65 nm, 40 nm and 28 nm CMOS technologies to evaluate them for their static power side-channel security. In the course of this project it was discovered that several characteristics of the static power consumption make it particularly dangerous as a source of information leakage. For instance, adversaries can significantly increase the information leakage through this side channel by increasing the supply voltage or the temperature of the device under test to figuratively squeeze the secrets out of the target. Furthermore, while traditional power analysis attacks can only learn information about secrets while they are actively processed by the hardware, this new form of adversary can extract information as long as it is present or saved anywhere in the circuit. Finally, it has been discovered that the inherent noise reduction of static power sidechannel attacks allows adversaries to circumvent countermeasures that rely on significant noise levels to be effective. Considering all these discoveries it is clearly necessary to develop dedicated protection mechanisms against this threat. In this project multiple combined masking and hiding countermeasures have been evaluated for their ability to prevent the extraction of secret information through the static power consumption from devices manufactured in advanced nanometer technologies. Those results will be helpful for the design of high-security cryptographic hardware in nanometer semiconductor technologies in the future.

Publications

 
 

Additional Information

Textvergrößerung und Kontrastanpassung