Mitigating Power Supply Glitch based Fault Attacks with Fast All-Digital Clock Modulation Circuit

Arvind Singh1,a, Monodeep Kar2, Nikhil Chawla1,b and Saibal Mukhopadhyay1,c
1Georgia Institute of Technology
arathorearvind19@gatech.edu
bnikhilchawla@gatech.edu
csaibal.mukhopadhyay@ece.gatech.edu
2Intel Labs
monodeep.kar@intel.com

ABSTRACT


This paper experimentally demonstrates that an onchip integrated fast all-digital clock modulation (F-ADCM) circuit can be used as a countermeasure against supply glitch and temperature variations-based fault injection attacks (FIA). The FADCM circuit modulates clock edges in presence of DC/transient supply glitches and temperature variations to ensure correct operation of the underlying cryptographic circuit. With a testchip manufactured in 130nm CMOS process, we first demonstrate an inexpensive methodology to conduct a fault attack on hardware implementation of a 128-bit advanced encryption standard (AES) engine using externally controlled supply glitches. Next, we show that with F-ADCM circuit, it is no longer possible to inject supply/temperature glitch-based faults even after 10 million encryptions across varying operating conditions. Moreover, in extreme operating conditions, the F-ADCM circuit doesn’t generate any clock edges, leading to complete failure of the AES encryption, indicating no exploitable faults are present.

Keywords: Differential fault analysis, Cryptography, Advanced encryption standard, Fault injection attack, Supply glitch, Clock modulation, Error resilience, PVT variations.



Full Text (PDF)