-
When in operation, cipher chips emit photons which can reveal important information about their operation and data. An experimental system based on single-photon counting for the detection, transmission, processing and analysis of photonic emission from CMOS semiconductor integrated circuits has been designed and constructed. Using time-correlated single-photon counting (TCSPC) technology, we have analyzed the photon emission of cipher chip AT89C52, and measured the relationship between its emission intensity and voltage. We have also analyzed in detail the relationship between the photonic emission and the operations and data processed in the chip at the instruction level. Furthermore, we have confirmed the feasibility of our TCSPC technique using an oscilloscope. Our experimental results show that cipher chip photonic emission analysis based on TCSPC technology is a relatively low cost but effective method for optical side-channel attacks, and that it poses a serious practical threat to cipher chip security.
-
Keywords:
- cipher chip security analysis /
- side-channel attack /
- time-correlated single-photon counting /
- operation/data dependency of photonic emission
[1] Boer B, Lemke K, Wicke G 2002 Cryptographic Hardware and Embedded Systems-CHES 2002 4th International Workshop Redwood Shores, CA, USA, August 13-15, 2002 p228
[2] Agrawal D, Archambeault B, Rao J R, Rohatgi P 2002 Cryptographic Hardware and Embedded Systems-CHES 2002 4th International Workshop Redwood Shores, CA, USA, August 13-15, 2002 p29
[3] Skorobogatov S, Anderson R 2002 Cryptographic Hardware and Embedded Systems-CHES 2002 4th International Workshop Redwood Shores, CA, USA, August 13-15, 2002 p2
[4] Skorobogatov S 2005 Ph.D. Dissertation (London: University of Cambridge)
[5] Ferrigno J, Hlavá M 2008 IET Infor. Secur. 2 94
[6] Kramer J, Nedospasov D, Schlosser A, Seifert J 2013 Constructive Side-Channel Analysis and Secure Design (Berlin: Springer-Verlag) p1
[7] Sun Z B, Ma H Q, Lei M, Yang H D, Wu L A, Zhai G J, Feng J 2007 Acta Phys. Sin. 56 5790 (in Chinese) [孙志斌, 马海强, 雷鸣, 杨捍东, 吴令安, 翟光杰, 冯稷 2007 物理学报 56 5790]
[8] Wang Y J, Ding T, Ma H Q, Jiao R Z 2014 Chin. Phys. B 23 060308
[9] LIANG Y, ZENG H P 2014 Sci. China Phys. Mech. Astron. 57 1218
[10] Liu Y, Wu Q L, Han Z F, Dai Y M, Guo G C 2010 Chin. Phys. B 19 080308
[11] Zhang L B, Kang L, Chen J, Zhao Q Y, Jia T, Xu W W, Cao C H, Jin B B, Wu P H 2011 Acta Phys. Sin. 60 038501 (in Chinese) [张蜡宝, 康琳, 陈健, 赵清源, 郏涛, 许伟伟, 曹春海, 金飚兵, 吴培亨 2011 物理学报 60 038501]
[12] Stellari F, Zappa F, Cova S, Vendrame L 1999 IEDM Technical Digest-International Electronic Devices Meeting Washington, USA 1999 p487
[13] Schlosser A, Nedospasov D, Kramer J, Orlic S, Seifert J-P 2013 J. Cryptogr. Eng. 3 3
[14] Deboy G, Kölzer J 1993 Semicond. Sci. Technol. 9 1017
[15] Villa S, Lacaita A L, Pacelli A 1995 Phys. Rev. B 52 10993
[16] Stellari F, Zappa F, Ghioni M, Cova S 1999 Solid-State Device Research Conference Leuvem, Belgium, September 13-15, 1999 p172
[17] Skorobogatov S 2009 6th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2009) Lausanne, Switzerland September 2009 p111
[18] Tsang J C, Kash J A, Vallett D P 2000 IBM J. Res. Develop. 44 583
[19] Kash J, Tsang J 1997 Elect. Dev. Lett. 18 330
[20] Becker W 2005 Advanced Time-Correlated Single Photon Counting Techniques (Berlin: Springer-Verlag) pp19-23
[21] Becker W 2012 The bh TCSPC Handbook 5th Edition (Berlin: Becker & Hickl GmbH) pp51-57
[22] Mangard S, Oswald E, Popp T 2010 Power Analysis Attacks: Revealing the Secret of Smart Cards (New York: Springer Science+Business Media, LLC) pp38-43
-
[1] Boer B, Lemke K, Wicke G 2002 Cryptographic Hardware and Embedded Systems-CHES 2002 4th International Workshop Redwood Shores, CA, USA, August 13-15, 2002 p228
[2] Agrawal D, Archambeault B, Rao J R, Rohatgi P 2002 Cryptographic Hardware and Embedded Systems-CHES 2002 4th International Workshop Redwood Shores, CA, USA, August 13-15, 2002 p29
[3] Skorobogatov S, Anderson R 2002 Cryptographic Hardware and Embedded Systems-CHES 2002 4th International Workshop Redwood Shores, CA, USA, August 13-15, 2002 p2
[4] Skorobogatov S 2005 Ph.D. Dissertation (London: University of Cambridge)
[5] Ferrigno J, Hlavá M 2008 IET Infor. Secur. 2 94
[6] Kramer J, Nedospasov D, Schlosser A, Seifert J 2013 Constructive Side-Channel Analysis and Secure Design (Berlin: Springer-Verlag) p1
[7] Sun Z B, Ma H Q, Lei M, Yang H D, Wu L A, Zhai G J, Feng J 2007 Acta Phys. Sin. 56 5790 (in Chinese) [孙志斌, 马海强, 雷鸣, 杨捍东, 吴令安, 翟光杰, 冯稷 2007 物理学报 56 5790]
[8] Wang Y J, Ding T, Ma H Q, Jiao R Z 2014 Chin. Phys. B 23 060308
[9] LIANG Y, ZENG H P 2014 Sci. China Phys. Mech. Astron. 57 1218
[10] Liu Y, Wu Q L, Han Z F, Dai Y M, Guo G C 2010 Chin. Phys. B 19 080308
[11] Zhang L B, Kang L, Chen J, Zhao Q Y, Jia T, Xu W W, Cao C H, Jin B B, Wu P H 2011 Acta Phys. Sin. 60 038501 (in Chinese) [张蜡宝, 康琳, 陈健, 赵清源, 郏涛, 许伟伟, 曹春海, 金飚兵, 吴培亨 2011 物理学报 60 038501]
[12] Stellari F, Zappa F, Cova S, Vendrame L 1999 IEDM Technical Digest-International Electronic Devices Meeting Washington, USA 1999 p487
[13] Schlosser A, Nedospasov D, Kramer J, Orlic S, Seifert J-P 2013 J. Cryptogr. Eng. 3 3
[14] Deboy G, Kölzer J 1993 Semicond. Sci. Technol. 9 1017
[15] Villa S, Lacaita A L, Pacelli A 1995 Phys. Rev. B 52 10993
[16] Stellari F, Zappa F, Ghioni M, Cova S 1999 Solid-State Device Research Conference Leuvem, Belgium, September 13-15, 1999 p172
[17] Skorobogatov S 2009 6th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2009) Lausanne, Switzerland September 2009 p111
[18] Tsang J C, Kash J A, Vallett D P 2000 IBM J. Res. Develop. 44 583
[19] Kash J, Tsang J 1997 Elect. Dev. Lett. 18 330
[20] Becker W 2005 Advanced Time-Correlated Single Photon Counting Techniques (Berlin: Springer-Verlag) pp19-23
[21] Becker W 2012 The bh TCSPC Handbook 5th Edition (Berlin: Becker & Hickl GmbH) pp51-57
[22] Mangard S, Oswald E, Popp T 2010 Power Analysis Attacks: Revealing the Secret of Smart Cards (New York: Springer Science+Business Media, LLC) pp38-43
Catalog
Metrics
- Abstract views: 6571
- PDF Downloads: 699
- Cited By: 0