Correlation power analysis attack against STT-MRAM based cyptosystems

Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2017 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are considered potential candidates for implementing low-power, high density storage systems. The vulnerability of such nonvolatile memory (NVM) based cryptosystems to standard side-channel attacks must be thoroughly assessed before deploying them in practice. In this paper, we outline a generic Correlation Power Analysis (CPA) attack strategy against STT-MRAM based cryptographic designs using a new
more » ... model. In our proposed attack methodology, an adversary exploits the power consumption patterns during the write operation of an STT-MRAM based cryptographic implementation to successfully retrieve the secret key. In order to validate our proposed attack technique, we mounted a CPA attack on MICKEY-128 2.0 stream cipher design consisting of STT-MRAM cells with Magnetic Tunnel Junctions (MTJs) as storage elements. The results of the experiments show that the STT-MRAM based implementation of the cipher circuit is susceptible to standard differential power analysis attack strategy provided a suitable hypothetical power model (such as the one proposed in this paper) is selected. In addition, we also investigated the effectiveness of state-of-the-art side-channel attack countermeasures for MRAMs and found that our proposed scheme is able to break such protected implementations as well. Index Terms-Correlation power analysis attack, Spin-transfer torque magnetic RAM, MICKEY-128 2.0 stream cipher
doi:10.1109/hst.2017.7951835 dblp:conf/host/ChakrabortyMS17 fatcat:y5r6q3rlujfcvg546zkejuupyu