xCORE and Side-Channel Attack

Off topic discussions that do not fit into any of the above can go here. Please keep it clean and respectful.
User avatar
aclassifier
Respected Member
Posts: 356
Joined: Wed Apr 25, 2012 8:52 pm

xCORE and Side-Channel Attack

Postby aclassifier » Thu Apr 30, 2020 9:25 am

I have been made aware of something called Side-Channel Attack (SCA). It seems to be either Simple Power Analysis (SPA) or Differential power analysis (DPA) (Power analysis). I have started blogging a little about it [1].

I am sure many of the users here would know this already. However, I will write a short intro for the novices, like myself:

The theme is about finding out what a device does when it solves some cryptographic problem, in order to crack some key, etc. Toolsets are being sold, with capture boards and target/victim boards. There is no xCORE target board out there. I have queried some about this at a forum [2], where I also have mentioned xCORE.

In [1] ("XMOS") I have also quoted some very recent marketing material from XMOS where they talk about xcore.ai. Reading between the lines there I think I see that XMOS is aware of side-channel attacks. They also mention a random generator on xcore.ai.

I would think that it would be easier to obfuscate cryptographic calculations (as listened to over a radio or on the power line) on the xCORE architecture than on any other architecture I would know of. Multiplexing tasks on same logical core with [[combinable]] (how random could that be done?) and on different cores (how random and obfuscating could what's being done at the different core's scheduled cycles be?)

Any comments on this very interesting theme?

[1] Fault injection detection (standard disclaimer, no ads, no money, no gifts, just fun and expenses)
[2] Task/processes to insert random noise
--
Øyvind Teig
Trondheim (Norway)
https://www.teigfam.net/oyvind/home/

Who is online

Users browsing this forum: No registered users and 4 guests