What is it about?

Cryptography hardware is vulnerable to side-channel attacks on power supply current flow and electro-magnetic emission. This article proposes simulation-based power and EM side-channel leakage analysis techniques on a cryptographic integrated circuit chip in system level assembly.

Featured Image

Why is it important?

Side-channel attack is a practical threat to cryptosystems. When the designers design an application specific IC chip with crypto module, they try to mitigate the vulnerability against side-channel attacks. However, it is difficult for designers to estimate the vulnerability at design stage without simulation based side-channel leakage analysis techniques. In this paper, we proposed simulation technique which is optimized for evaluationg side-channel leakage of very large-scale integration.

Perspectives

We proposed simulation-based power and EM side-channel leakage analysis techniques. In this paper, the proposed simulation flow is verified for the correctness and accuracy of side-channel leakage through detailed comparisons with silicon measurements. The design flow of an IC chip can equip the proposed techniques for the exploration of side-channel attack resiliency. It helps designer to implement crypto modules to hardware with high resiliency against side-channel attack.

Kazuki Monta
Kobe Daigaku

Read the Original

This page is a summary of: Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis, ACM Journal on Emerging Technologies in Computing Systems, December 2022, ACM (Association for Computing Machinery),
DOI: 10.1145/3568957.
You can read the full text:

Read

Contributors

The following have contributed to this page