期刊文献+

A Standard Cell-Based Leakage Power Analysis Attack Countermeasure Using Symmetric Dual-Rail Logic

A Standard Cell-Based Leakage Power Analysis Attack Countermeasure Using Symmetric Dual-Rail Logic
原文传递
导出
摘要 Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor. Leakage power analysis (LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static (leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor (CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic (SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implelnent an LPA-resistant crypto processor.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第2期169-172,共4页 上海交通大学学报(英文版)
基金 the Software and Integrated CircuitIndustries Development Foundation of Shanghai(No.12Z116010001)
关键词 correlation power analysis cryptograph differential power analysis leakage power analysis(LPA) power analysis simple power analysis correlation power analysis, cryptograph, differential power analysis, leakage power analysis (LPA), power analysis, simple power analysis
  • 相关文献

参考文献11

  • 1ALIOTO M, POLI M, ROCCHI S. A general power model of differential power analysis attacks to static logic circuits [J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2010, 18(5): 711- 724.
  • 2PoPP T. An introduction to implementation at- tacks and countermeasures [C]/ / Proceedings of the 7th IEEE International Conference on Formal Meth- ods and Models for Co-Design. Piscataway, N J, USA: IEEE Press, 2009: 108-115.
  • 3BRIER E, CLAVIER C, OLIVIER F. Correlation power analysis with a leakage model [Jl. Uryptographie Hard- ware and Embedded Systems, 2004, 3156: 16-29.
  • 4GUNEYSU T, MORADI A. Generic side-channel coun- termeasures for reconfigurable devices [J]. Crypto- graphic Hardware and Embedded Systems, 2011, 6917: 33-48.
  • 5ABDOLLAHI F, FALLAH F, PEDRAM M. Leakage cur- rent reduction in CMOS VLSI circuits by input vector control [J]. IEEE Transactions on Very Large Scale In- tegration (VLSI) Systems, 2004, 12(2): 140-154.
  • 6ALIOTO M, GIANCANE L, SCOTTI G, et al. Leakage power analysis attacks: A novel class of attacks to nanometer cryptographic circuits [J]. IEEE Transac- tions on Circuits and Systems. I: Regular Papers, 2010, 57(2): 355-367.
  • 7LIN L, BURLESON W. Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems [C]//Proceedings of IEEE International Symposium on Circuits and Systems. Seattle, Piscataway, N J, USA: IEEE Press, 2008: 252-255.
  • 8DJUKANOVIC M, GIANCANE pact of process variations on [C]/ / Proceedings of Second on Computer and Electrical N J, USA: IEEE Press, 2009: L, SCOTTI C-, et al. Im- LPA attacks effectiveness International Conference Engineering. Piscataway, 102-106.
  • 9DJUKANOVIC M, GIANCANE L, SCOTTI G, et al. Leakage power analysis attacks: Effectiveness on DPA resistant logic styles under process variations [C]//Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS). Piscataway, N J, USA: 1EEE Press, 2011: 2043-2046.
  • 10ALIOTO M, GIANCANE L, SCOTTI G, et al. Leakage power analysis attacks: Theoretical analysis and im- pact of variations [C]// Proceedings of 16th IEEE In- ternational Conference on Electronics, Circuits, and Systems. Piscataway, N J, USA: IEEE Press, 2009: 85- 88.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部