期刊文献+

CMOS门电路的功率与数据相关性 被引量:2

Correlation between power and data in CMOS gates
原文传递
导出
摘要 为了研究电路实现形式对密码芯片抗“功耗分析攻击”能力的影响,考察了CMOS门电路的交流馈通对电源电流的影响,输入组合对电路充放电网络的影响以及静态电流的数据相关性。对静态逻辑、N/P型动态逻辑和差分Domi-no逻辑的这3种信息泄漏机制进行了具体分析,并对这4种逻辑的2输入与门和或门进行了仿真。静态电路和普通动态电路不同输入变化对应的电流曲线间的最大差值都大于60μA,而差分Domino电路的所有电流曲线之差小于2μA。结果表明:采用N型Domino逻辑,并使数据输入只在时钟为高时有效,相对于其他逻辑功耗信息泄漏要小。 The logic of the VLSI circuit affects the Power Analysis resistance of cryptographic VLSI circuit. This paper analyzes the mechanisms of information leakage in the current of CMOS gates, including the AC coupling, correlations between the charging/ discharging network parameters and the input pattern. The data dependency of the static current is espacially significant. The current traces in static logic, N-type/P-type dynamic logic and differential Domino logic circuits were analyzed and simulated. The maximum differencet between the current plots of the static and the common dynamic gates were larger than 60μA, while the difference for the differential Domino logic circuit was less than 2μA. Therefore, for low information leakage, N-type differential Domino logic circuits should be used with the constraint that data inputs are valid only when the clock signal is high.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第7期985-988,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(60236020)
关键词 场效应型集成电路 数据安全 功耗分析 差分功耗 功耗数据相关性 CMOS circuits data security power analysis differential power analysis power-data correlation
  • 相关文献

参考文献10

  • 1Kocher P,Jaffe J,Jun B.Differential power analysis [A].Wiener M.Advances in Cryptology - CRYPTO'99 [C].New York:Springer-Verlag,1999.388-397.
  • 2Coron J S,Kocher P,Naccache D.Statistics and Secret Leakage [J].ACM Trans on Embedded Computing Systems,2004,3(3):492-508.
  • 3Najm F N,Burch R,Yang P,et al.Probabilistic simulation for reliability analysis of CMOS VLSI circuits [J].Computer-Aided Design of Integrated Circuits and Systems IEEE Trans,1990,9(4):439-450.
  • 4LIN Jiing-Yuan,SHEN Wen-Zen,JOU Jing-Yang.A power modeling and characterization method for the CMOS standard cell library [A].1996 IEEE/ACM International Conference on Computer-Aided Design [C].San Jose:IEEE Comput Soc Press,1996.400-404.
  • 5Veendrick Harry J M.Short-circuit dissipation of static CMOS circuitry and its impact on the design of buffer circuits [J].IEEE Journal of Solid-State Circuits,1984,SC-19(4):468-473.
  • 6Elmore W C.Transient response of damped linear networks with particular regard to wideband amplifiers [J].J Applied Physics,1948,1(19):55-63.
  • 7Rabaey J M.Digital Integrated Circuits:A Design Perspective (2nd Edition) [M].Beijing:Tsinghua University Press,2004.
  • 8Kim Nam Sung,Austin T,Blaauw D,et al.Leakage current:Moore's law meets static power [J].Computer,2003,36(12):68-75.
  • 9Verhoeff T.Delay-insensitive codes-an overview [J].Distributed Computing,1988,3(1):1-8.
  • 10LIN Jiing-Yuan,LIU Tai-Chien,SHEN Wen-Zen.A cell-based power estimation in CMOS combinational circuits [A].1994 IEEE/ACM International Conference on Computer-Aided Design [C].San Jose:ACM,1994.304-309.

同被引文献16

  • 1韩军,曾晓洋,汤庭鳌.DES密码电路的抗差分功耗分析设计[J].Journal of Semiconductors,2005,26(8):1646-1652. 被引量:11
  • 2Chari S, Rao J R, Rohatgi P. Template attacks[C]// Proceedings of Cryptographic Hardware and Embed- ded Systems ( CHES 2003 ). Cologne.. Springer, 2003: 13-28.
  • 3Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model [C] // Proceedings of Cryptographic Hardware and Embedded Systems (CHES 2004), LNCS 3156. Berlin.. Springer, 2004; 16-29.
  • 4Agrawal D, Rao J R, Rohatgi P, et al. Templates as master keys [ C] // Proceedings of Cryptographic Hardware and Embedded Systems (CHES 2005 ). Edinburgh.. Springer, 2005: 15-29.
  • 5KangSung-Mo,LeblebiciY.CMOS数字集成电路--分析与设计[M].3版.王志功,窦建华,译.北京:电子工业出版社,2005.
  • 6Rechberger C, Oswald E. Practical template attacks [C] // Proceedings of Information Security Applica- tions, 5th International Workshop(WISA 2004). Jeju Island: Springer, 2004: 443-457.
  • 7National Institute of Standards and Technology. FIPS-197 Advanced encryption standard [S]. Gaithersburg.. National Institute of Standards and Technology, 2001.
  • 8MENEZES AJ, VAN OORSCHOT PC, VANSTONE SA.应用密码学手册[M].胡磊,王鹏,译.北京:电子工业出版社,2005.
  • 9Kocher P, Jaffe J, Jun B. Differential power analysis [C] // Proceeding of the Advances in Cryptology (CRYPTO'99). Santa Barbara: Lecture Notes in Computer Science, 1999:388-397.
  • 10Rabaey J M,Chandrakasan A,Nikolic B.数字集成电路-电路、系统与设计[M].2版.周润德,译.北京:电子工业出版社,2004.

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部