2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)
Download PDF

Abstract

Correlation Power Analysis, is recently demonstrated as a viable attack model for Keccak, which is the new hash function selected by NIST for SHA-3. Early studies show that CPA attacks can be launched on this algorithm with conventional CMOS implementations. To mitigate such power attacks, in this research we propose secure neural primitives using memristor neural logic blocks. Five different mitigation techniques are proposed, including baseline dualcore design, theta Plane Masking, neural logic block based theta Plane Masking, Analog neural logic block theta Plane Masking, and Analog dual-neural logic block theta Plane Masking. A framework for the CPA attack was designed and the mitigation techniques were assessed based on the number of power traces used, correlation coefficients, confidence ratios, and transistor count. Success rate of guessing a key during SHA-3 operations, while configured as a MAC, is used as a system benchmark. Secure neural primitives are shown to be robust to the CPA attacks.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles