A Keccak-based wireless authentication tag with per-query key update and power-glitch attack countermeasures

Chiraag S. Juvekar, Hyung Min Lee, Joyce Kwong, Anantha P. Chandrakasan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

Counterfeiting is a major problem plaguing global supply chains. While small low-cost tagging solutions for supply-chain management exist, security in the face of fault-injection [1] and side-channel attacks [2] remains a concern. Power glitch attacks [3] in particular attempt to leak key-bits by inducing fault conditions during cryptographic operation through the use of over-voltage and under-voltage conditions. This paper presents the design of a secure authentication tag with wireless power and data delivery optimized for compact size and near-field applications. Power-glitch attacks are mitigated through state backup on FeRAM based non-volatile flip-flops (NVDFFs) [4]. The tag uses Keccak [5] (the cryptographic core of SHA3) to update the key before each protocol invocation, limiting side-channel leakage to a single trace per key.

Original languageEnglish
Title of host publication2016 IEEE International Solid-State Circuits Conference, ISSCC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages290-291
Number of pages2
ISBN (Electronic)9781467394666
DOIs
Publication statusPublished - 2016 Feb 23
Externally publishedYes
Event63rd IEEE International Solid-State Circuits Conference, ISSCC 2016 - San Francisco, United States
Duration: 2016 Jan 312016 Feb 4

Publication series

NameDigest of Technical Papers - IEEE International Solid-State Circuits Conference
Volume59
ISSN (Print)0193-6530

Conference

Conference63rd IEEE International Solid-State Circuits Conference, ISSCC 2016
Country/TerritoryUnited States
CitySan Francisco
Period16/1/3116/2/4

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A Keccak-based wireless authentication tag with per-query key update and power-glitch attack countermeasures'. Together they form a unique fingerprint.

Cite this