Scrambling technique of instruction power consumption for side-channel attack protection

Dongkyu Lee, Myeongjin Kang, Peter Plesznik, Jeonghun Cho, Daejin Park

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper proposed the technique to protect the embedded devices from the timing analysis attack using a side-channel attack. Embedded devices have the advantage of excellent accessibility. However, because of the excellent accessibility, embedded devices are vulnerable to hardware attacks. In the case of the password matching function, the attacker can see the execution time of the function and infer which digits are matched monitoring the power consumption and using the timing analysis attack. In this paper, we proposed the clock scrambling method to hide the execution time of the instruction. It can help to protect embedded devices from the timing analysis attack by randomizing the execution time of the instruction. Our hardware model costs 2.56 % additional area for clock scrambler, and costs on average 28% in execution time and 27 % additional power consumption for scrambling power pattern.

Original languageEnglish
Title of host publication2020 International Conference on Electronics, Information, and Communication, ICEIC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728162898
DOIs
StatePublished - Jan 2020
Event2020 International Conference on Electronics, Information, and Communication, ICEIC 2020 - Barcelona, Spain
Duration: 19 Jan 202022 Jan 2020

Publication series

Name2020 International Conference on Electronics, Information, and Communication, ICEIC 2020

Conference

Conference2020 International Conference on Electronics, Information, and Communication, ICEIC 2020
Country/TerritorySpain
CityBarcelona
Period19/01/2022/01/20

Fingerprint

Dive into the research topics of 'Scrambling technique of instruction power consumption for side-channel attack protection'. Together they form a unique fingerprint.

Cite this