Loading [MathJax]/extensions/MathMenu.js
Signal-to-noise ratio measurements of side-channel traces for establishing low-cost countermeasure design | IEEE Conference Publication | IEEE Xplore

Signal-to-noise ratio measurements of side-channel traces for establishing low-cost countermeasure design


Abstract:

Improving the countermeasures against side-channel attacks (SCAs) increases the cost of both designing the countermeasures and evaluating SCA resistance. This may force c...Show More

Abstract:

Improving the countermeasures against side-channel attacks (SCAs) increases the cost of both designing the countermeasures and evaluating SCA resistance. This may force cryptographic ICs to remain vulnerable. The increased cost is due to an indispensable procedure where a large number of side-channel traces need to be analyzed in order to evaluate the SCA resistance. In this work, a low-cost method to design and evaluate countermeasures using the signal-to-noise ratio (SNR) of side-channel traces as design and evaluation criteria is proposed. The method combines two existing methods: a prediction method of correlation coefficients between side-channel traces and a power model based on the SNR of the side-channel traces, and an estimation method of the number of traces needed to disclose the secret key based on the correlation coefficients. We construct a method to measure the SNR of side-channel traces and validate it for the design and evaluation criteria. In our method, the SNR is first calculated from signal and noise variances extracted from side-channel traces by increasing the number of averaging in side-channel trace measurements, and then the correlation coefficients and the number of traces for key-disclose are estimated on the basis of the calculated SNR. We confirmed that the estimated correlation coefficient and the number of traces for key-disclose were in good agreement with the corresponding measured ones. This result demonstrates that the proposed method can accurately measure the SNR of side-channel traces.
Date of Conference: 20-23 June 2017
Date Added to IEEE Xplore: 13 July 2017
ISBN Information:
Conference Location: Seoul, Korea (South)

I. Introduction

Side-channel attacks (SCAs) that illegally decipher secret information of cryptographic equipment by exploiting electromagnetic (EM) radiation/emanation are a realistic threat [1]. Although SCA is a powerful cryptanalytic attack, if cryptographic devices are protected by countermeasures, attackers need to expend a lot of effort to execute the attack. However, the countermeasures increase the cost of SCA resistance evaluation because it is necessary to perform a SCA equivalent to one performed by the attacker, and improving the vulnerability by countermeasures can require a larger number of side-channel traces than before improvement, even for evaluation. In the existing SCA resistance evaluation, a number of side-channel traces required for the key decryption are analyzed as evaluation criterion. Key decryption generally requires thousands to hundreds of thousands of traces in SCAs. This means that a huge amount of traces may have to be acquired every time the countermeasure design is changed. In order to avoid this, it is necessary to accurately set the design goals for achieving the required SCA resistance. Setting a signal-to-noise ratio (SNR) as the design goal could lead to efficient countermeasure design and reduction of evaluation cost.

Contact IEEE to Subscribe

References

References is not available for this document.