Shahed University

A DPA Attack on IOA Data-Dependent Delay Countermeasure Based on an Inherent Tempo-Spatial Data Dependency

S. Kaedi | Mohammadali Doostari | M.B. Ghaznavi-Ghoushchi

URL :   http://research.shahed.ac.ir/WSR/WebPages/Report/PaperView.aspx?PaperID=85663
Date :  2018/10/16
Publish in :    IEEE Transactions on Circuits and Systems II: Express Briefs
DOI :  https://doi.org/10.1109/tcsii.2018.2877525
Link :  https://ieeexplore.ieee.org/document/8502797
Keywords :DPA, Delay, Inherent

Abstract :
A recent attack countermeasure on an S-box called Data dependency delay countermeasure (D3C) against a Differential Power Analysis (DPA) has been introduced by Itamar-Osnat-Alexander (IOA). The inserted delay elements (DEs) are temporally-invariant however they are spatially-variant. In this paper, we introduce a basic analysis of the shortcoming of flattening the power in D3C and investigate it by utilizing counterexample. In the proposed approach, we have utilized a non-true temporally random power as a shortcoming of IOA countermeasure to perform a successful DPA attack. The attack method is a chosen-plaintext attack. In this attack, the input data pattern is set to be constant to fix the delay of the D3C countermeasure. Hence, the countermeasure is bypassed and consequently the DPA attack on the S-box, which is introduced (the S-box) by IOA, is successful. By this attack, all the bits of the S-box, which was claimed as attack-proof by the D3C method, are recovered bitwise. In the first place, the S-box is modeled in a SPICE simulator to perform the proposed idea. Then, the proposed attack on IOA countermeasure is proved by HDL experimental results. The experiment is carried out via a Sakura-GW evaluation board and a Xilinx FPGA Spartan-6LX75 test-bed.