Authors:
Javad Bahrami
1
;
Mohammad Ebrahimabadi
1
;
Sofiane Takarabt
2
;
Jean-luc Danger
3
;
Sylvain Guilley
3
;
2
and
Naghmeh Karimi
1
Affiliations:
1
University of Maryland Baltimore County, Baltimore, 21250, U.S.A.
;
2
Secure-IC S.A.S., Think Ahead Business Line, Paris, France
;
3
LTCI, Télécom Paris, Institut Polytechnique de Paris, Paris, France
Keyword(s):
Side-channel Attacks, Pre-silicon Evaluation, Toggle Count, SPICE Simulation, Masked Implementations.
Abstract:
Cryptographic chips are prone to side-channel analysis attacks aiming at extracting their secrets. Side-channel
leakage is particularly hard to remove completely, unless using a bottom-up approach (compositional security).
On the contrary, industrial secure-by-design methods are rather relying on a top-down approach: (would-be)
protected circuits are synthesized by Electronic Design Automation (EDA) tools. Tracking that no leakage exists
at any refinement stage is therefore a challenge. Experience has shown that multiple leakages can resurge
out of the blue when a sound RTL design is turned into a technology-mapped netlist.
Checking for leaks and identifying them is a challenge. When the netlist is unstructured (e.g., it results from
an EDA tool), dynamic checking appears as the most straightforward approach. It is feasible, given only a
few thousand execution traces, to decide with a great certainty whether a leakage hides at some time samples
within the trace or not. In pr
actice, such easy detection is fostered by the fact that the activity of signals in
cryptographic implementations (even more true for masked implementations) is almost maximal (=50%).
The remaining question is about the adequate abstraction level of the simulation. The higher as possible abstractions
are preferred, as they potentially capture more situations. However, if the simulation is too abstract,
it may model the reality inappropriately. In this paper, we explore whether or not an evenemential simulation
(toggle count) is faithful with respect to a low-level simulation (at SPICE level). Our results show that
both abstraction levels match qualitatively for unprotected implementations. However, abstract toggle count
simulations are no longer connected to real SPICE simulations in masked implementations. The reason is
that the effect of the random mask is to mix evenemential simulations (which only reflect “approximately”
the SPICE reality) together, in such a way that the useful information is lost. Therefore, masked logic netlist
implementations shall be analysed only at SPICE level.
(More)