Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks
David Spielmann
EPFL Lausanne, Switzerland
Ognjen Glamočanin
EPFL Lausanne, Switzerland
Mirjana Stojilović
EPFL Lausanne, Switzerland
Keywords: FPGA, Multitenancy, Power Analysis Attack, On-chip sensors
Abstract
State-of-the-art sensors for measuring FPGA voltage fluctuations are time-to-digital converters (TDCs). They allow detecting voltage fluctuations in the order of a few nanoseconds. The key building component of a TDC is a delay line, typically implemented as a chain of fast carry propagation multiplexers. In FPGAs, the fast carry chains are constrained to dedicated logic and routing, and need to be routed strictly vertically. In this work, we present an alternative approach to designing on-chip voltage sensors, in which the FPGA routing resources replace the carry logic. We present three variants of what we name a routing delay sensor (RDS): one vertically constrained, one horizontally constrained, and one free of any constraints. We perform a thorough experimental evaluation on both the Sakura-X side-channel evaluation board and the Alveo U200 datacenter card, to evaluate the performance of RDS sensors in the context of a remote power side-channel analysis attack. The results show that our best RDS implementation in most cases outperforms the TDC. On average, for breaking the full 128-bit key of an AES-128 cryptographic core, an adversary requires 35% fewer side-channel traces when using the RDS than when using the TDC. Besides making the attack more effective, given the absence of the placement and routing constraint, the RDS sensor is also easier to deploy.
Publication
Transactions of Cryptographic Hardware and Embedded Systems, Volume 2023, Issue 2
PaperArtifact
Artifact number
tches/2023/a6
Artifact published
September 4, 2023
BibTeX How to cite
Spielmann, D., Glamočanin, O., & Stojilović, M. (2023). RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(2), 543–567. https://doi.org/10.46586/tches.v2023.i2.543-567. Artifact at https://artifacts.iacr.org/tches/2023/a6.