RISC-V随机化过程的抗功耗分析攻击设计*

白创, 肖鸣松, 童元满

集成电路与嵌入式系统 ›› 2023, Vol. 23 ›› Issue (7) : 3-7.

PDF(1835 KB)
PDF(1835 KB)
集成电路与嵌入式系统 ›› 2023, Vol. 23 ›› Issue (7) : 3-7.
专题论述

RISC-V随机化过程的抗功耗分析攻击设计*

  • 白创1, 肖鸣松1, 童元满2
作者信息 +

Anti-power Analysis Attack Design Based on RISC-V Randomization Process

  • Bai Chuang1, Xiao Mingsong1, Tong Yuanman2
Author information +
文章历史 +

摘要

提出了一种基于随机化过程来抵御功耗分析攻击的方法。该随机化过程综合采用3种手段:在指令执行过程中,随机生成并插入与上一条真实指令相似的虚拟指令,使得插入的随机功耗与上条真实指令相近以避免被准确分析功耗;在指令执行、写回阶段插入一个随机延时来混淆指令执行时间以避免被准确定位;通过4种不同频率的时钟随机切换来对系统时钟进行扰乱以混淆瞬时功耗。基于CV32E40P处理器实现了该方法并通过相关功耗分析攻击进行实验,实验结果表明得到的最高相关性系数为0.139,比原处理器低0.641,该方法大大提高了处理器的抗功耗分析攻击能力。

Abstract

In the paper,a method based on randomization to resist power analysis attacks is proposed.Three methods of randomization are adopted in this process:a virtual instruction similar to the previous real instruction is randomly generated and inserted during the execution of the instruction,so that the inserted random power consumption is similar to the real instruction of the previous instruction to avoid accurate power analysis.A random delay is inserted in the stage of instruction execution and write back to confuse instruction execution time to avoid accurate positioning.The system clock is disturbed by random switching of four different frequencies to confuse instantaneous power consumption.The CV32E40P is used to implement this method and the attack experiment is carried out by correlation power analysis attack.The results show that the highest correlation coefficient obtained is 0.139,which is 0.641 lower than that of the original processor.This method greatly improves the capability of the processor to resist power analysis attack.

关键词

CV32E40P / 功耗分析攻击 / RISC-V / 相关性系数

Key words

CV32E40P / power analysis attack / RISC-V / correlation coefficient

引用本文

导出引用
白创, 肖鸣松, 童元满. RISC-V随机化过程的抗功耗分析攻击设计*[J]. 集成电路与嵌入式系统. 2023, 23(7): 3-7
Bai Chuang, Xiao Mingsong, Tong Yuanman. Anti-power Analysis Attack Design Based on RISC-V Randomization Process[J]. Integrated Circuits and Embedded Systems. 2023, 23(7): 3-7
中图分类号: TN40   

参考文献

[1] Kocher P,Jaffe J,Jun B.Differential power analysis.Advance in cryptology[C]//proc. annual international cryptology conf. santa barbara ca usa aug,1999.
[2] Schellenberg F,Gnad D R E,Moradi A,et al.An Inside Job:Remote Power Analysis Attacks on FPGAs[C]//2018 Design, Automation & Test in Europe Conference & Exhibition (DATE),2018.
[3] Duan X,Chen D,Fan X,et al.Research and Implementation on Power Analysis Attacks for Unbalanced Data[J].Security and Communication Networks,2020(3):1-10.
[4] 顾星远,谷大君,谢鑫君.一种软件级双轨逻辑的完整实现方案[J].通信技术,2013,46(4):1-4.
[5] PEI C.A method of masking SM4 and analysis against DPA attacks[J].Journal of Cryptologic Research,2016,3(1):79-90.
[6] He Z,Ao T,Wan M,et al.ERIST:An Efficient Randomized Instruction Insertion Technique to Counter Side-Channel Attacks[J].Iaeng International Journal of Computer Science,2016,43(1):65-71.
[7] Gaëtan Leplus,Olivier Savry,Lilian Bossuet.Insertion of random delay with context-aware dummy instructions generator in a RISC-V Processor[C]//2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),2022.
[8] Durvaux F,Renauld M,Standaert F X,et al.Efficient removal of random delays from embedded software implementations using hidden markov models[C]//Smart Card Research and Advanced Application Conference. Springer,Berlin,Heidelberg,2012.
[9] 邬可可,周莹,孔令晶.功耗分析下的密码芯片设计规范研究[J].网络空间安全,2019,10(7):97-101.
[10] Ouladj M,Guillot P,Mokrane F.Chosen Message Strategy To Improve The Correlation Power Analysis[J].IET Information Security,2019,13(4).
[11] Ba A D,Hoang T T,Le A T,et al.Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure[J].IEEE Access,2021.
[12] 刘强,刘斌,卢世雄,等.抗功耗分析攻击的安全RISC-V处理器研究[J].天津大学学报,2021,54(8):868-874.

基金

*高新技术产业科技创新引领计划(科技攻关类)项目(2020GK2012)。

PDF(1835 KB)

Accesses

Citation

Detail

段落导航
相关文章

/