International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore

Authors:
Zhimin Chen
Patrick Schaumont
Download:
URL: http://eprint.iacr.org/2010/272
Search ePrint
Search Google
Abstract: This paper discusses a novel direction for multicore cryptographic software, namely the use of multicore to protect a design against side-channel attacks. We present a technique which is based on the principle of dual-rail pre-charge, but which can be completely implemented in software. The resulting protected software is called a Virtual Secure Circuit (VSC). Similar to the dual-rail pre-charge technique, a VSC executes as two complementary programs on two identical processor cores. Our key contributions include (1) the analysis of the security properties of a VSC, (2) the construction of a VSC AES prototype on a dual-PowerPC architecture, (3) the demonstration of VSC's protection effectiveness with real side-channel attack experiments. The attack results showed that the VSC protected AES needs 80 times more measurements than the unprotected AES to find the first correct key byte. Even one million measurements were not sufficient to fully break VSC protected AES, while unprotected AES was broken using only 40000 measurements. We conclude that VSC can provide a similar side-channel resistance as WDDL, the dedicated hardware equivalent of dual-rail pre-charge. However, in contrast to WDDL, VSC is a software technique, and therefore it is flexible.
BibTeX
@misc{eprint-2010-23173,
  title={Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore},
  booktitle={IACR Eprint archive},
  keywords={implementation / Side-Channel Attack},
  url={http://eprint.iacr.org/2010/272},
  note={ chenzm@vt.edu 14739 received 10 May 2010},
  author={Zhimin Chen and Patrick Schaumont},
  year=2010
}