TY - JOUR
T1 - Evaluation of side-channel leakage simulation by using EMC macro-model of cryptographic devices
AU - Yano, Yusuke
AU - Iokibe, Kengo
AU - Teshima, Toshiaki
AU - Toyota, Yoshitaka
AU - Katashita, Toshihiro
AU - Hori, Yohei
N1 - Funding Information:
This work was supported by JSPS KAKENHI Grant Numbers JP16K00186, JP19H04110.
Publisher Copyright:
Copyright © 2021 The Institute of Electronics, Information and Communication Engineers
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2021/2/1
Y1 - 2021/2/1
N2 - Side-channel (SC) leakage from a cryptographic device chip is simulated as the dynamic current flowing out of the chip. When evaluating the simulated current, an evaluation by comparison with an actual measurement is essential; however, it is difficult to compare them directly. This is because a measured waveform is typically the output voltage of probe placed at the observation position outside the chip, and the actual dynamic current is modified by several transfer impedances. Therefore, in this paper, the probe voltage is converted into the dynamic current by using an EMC macro-model of a cryptographic device being evaluated. This paper shows that both the amplitude and the SC analysis (correlation power analysis and measurements to disclosure) results of the simulated dynamic current were evaluated appropriately by using the EMC macro-model. An evaluation confirms that the shape of the simulated current matches the measured one; moreover, the SC analysis results agreed with the measured ones well. On the basis of the results, it is confirmed that a register-transfer level (RTL) simulation of the dynamic current gives a reasonable estimation of SC traces.
AB - Side-channel (SC) leakage from a cryptographic device chip is simulated as the dynamic current flowing out of the chip. When evaluating the simulated current, an evaluation by comparison with an actual measurement is essential; however, it is difficult to compare them directly. This is because a measured waveform is typically the output voltage of probe placed at the observation position outside the chip, and the actual dynamic current is modified by several transfer impedances. Therefore, in this paper, the probe voltage is converted into the dynamic current by using an EMC macro-model of a cryptographic device being evaluated. This paper shows that both the amplitude and the SC analysis (correlation power analysis and measurements to disclosure) results of the simulated dynamic current were evaluated appropriately by using the EMC macro-model. An evaluation confirms that the shape of the simulated current matches the measured one; moreover, the SC analysis results agreed with the measured ones well. On the basis of the results, it is confirmed that a register-transfer level (RTL) simulation of the dynamic current gives a reasonable estimation of SC traces.
KW - Cryptographic device
KW - Dynamic current consumption simulation
KW - EMC macro-model
KW - FPGA
KW - RTL simulation
KW - Side-channel attack
UR - http://www.scopus.com/inward/record.url?scp=85100849562&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85100849562&partnerID=8YFLogxK
U2 - 10.1587/transcom.2020EBP3015
DO - 10.1587/transcom.2020EBP3015
M3 - Article
AN - SCOPUS:85100849562
SN - 0916-8516
VL - E104B
SP - 178
EP - 186
JO - IEICE Transactions on Communications
JF - IEICE Transactions on Communications
IS - 2
ER -