An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems

dc.contributor.authorMcDaniel, Larry T. IIIen
dc.contributor.committeechairMartin, Thomas L.en
dc.contributor.committeememberJones, Mark T.en
dc.contributor.committeememberAthanas, Peter M.en
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2014-03-14T20:39:30Zen
dc.date.adate2003-07-22en
dc.date.available2014-03-14T20:39:30Zen
dc.date.issued2003-03-29en
dc.date.rdate2003-07-22en
dc.date.sdate2003-06-06en
dc.description.abstractHardware devices implementing cryptographic algorithms are finding their way into many applications. As this happens, the ability to keep the data being processed or stored on the device secure grows more important. Power analysis attacks involve cryptographic hardware leaking information during encryption because power consumption is correlated to the key used for encryption. Power analysis attacks have proven successful against public and private key cryptosystems in a variety of form factors. The majority of the countermeasures that have been proposed for this attack are intended for software implementations on a microcontroller. This project focuses on the development of a VHDL tool for investigating power analysis attacks on FPGAs and exploring countermeasures that might be used. The tool developed here counted the transitions of CLB output signals to estimate power and was used to explore the impact of possible gate-level countermeasures to differential power analysis. Using this tool, it was found that only a few nodes in the circuit have a high correlation to bits of the key. This means that modifying only a small portion of the circuit could dramatically increase the difficulty of mounting a differential power analysis attack on the hardware. Further investigation of the correlation between CLB outputs and the key showed that a tradeoff exists between the amount of space required for decorrelation versus the amount of decorrelation that is desired, allowing a designer to determine the amount of correlation that can be removed for available space. Filtering of glitches on CLB output signals slightly reduced the amount of correlation each CLB had. Finally, a decorrelation circuit was proposed and shown capable of decorrelating flip-flop outputs of a CLB, which account for less than 10% of the CLB outputs signals.en
dc.description.degreeMaster of Scienceen
dc.identifier.otheretd-06062003-163826en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-06062003-163826/en
dc.identifier.urihttp://hdl.handle.net/10919/33451en
dc.publisherVirginia Techen
dc.relation.haspartLarry_McDaniel.pdfen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectDPAen
dc.subjectData Encryption Standarden
dc.subjectSPAen
dc.subjectpower analysisen
dc.titleAn Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systemsen
dc.typeThesisen
thesis.degree.disciplineElectrical and Computer Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Larry_McDaniel.pdf
Size:
784.69 KB
Format:
Adobe Portable Document Format

Collections