ABSTRACT
Side channel attacks are known to be efficient techniques to retrieve secret data. Within this context, this paper proposes to prototype a logic called Secure Triple Track Logic (STTL) on FPGA and evaluate its robustness against power analyses. More precisely, the paper aims at demonstrating that the basic concepts on which this logic leans are valid and may provide interesting design guidelines to obtain secure circuits.
- P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," in Proc. 19th International Conference on Cryptology (CRYPTO), pp. 388--397, Aug. 1999. Google ScholarDigital Library
- Z. Chen and Y. Zhou, "Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage," in Proc. 8th Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 242--254, Oct. 2006. Google ScholarDigital Library
- A. Bystrov, A. Yakovlev, D. Sokolov and J. Murphy, "Design and Analysis of Dual Rail Circuits for security Applications," IEEE Transactions on Computers, vol. 54, no. 4, pp. 449--460, Apr. 2005. Google ScholarDigital Library
- J. J. A. Fournier, S. W. Moore, H. Li, R. D. Mullins and G. S. Taylor, "Security Evaluation of Asynchronous Circuits," in Proc. 5th Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 137--151, Sept. 2003.Google Scholar
- G. F. Bouesse, M. Renaudin, S. Dumont, F. Germain, "DPA on Quasi Delay Insensitive Asynchronous Circuits : Formalization and Improvement," in Proc. Design, Automation and Test in Europe Conference and Exposition (DATE), pp. 424-429, Mar. 2005. Google ScholarDigital Library
- K. Tiri and I. Verbauwhede, "A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation", in Proc. Design, Automation and Test in Europe Conference and Exposition (DATE), pp. 246--251, Feb. 2004. Google ScholarDigital Library
- F. X. Standaert, S. B. Ors and B. Preneel, "Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?", in Proc. 6th Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 30--44, Aug. 2004..Google Scholar
- Z.- C. Yu, S. B. Furber and L. A. Plana, "An Investigation into the Security of Self-Timed Circuits," in Proc. 9th International Symposium on Asynchronous Circuits and Systems (ASYNC), pp. 206--215, May. 2003. Google ScholarDigital Library
- T. H. Y. Meng, R. W. Brodersen and D. G. Messerschmitt, "Automatic Synthesis of Asynchronous Circuits from High-Level Specifications," IEEE Transaction on Computer Aided Design, vol. 8, no. 11, pp. 1185--1205, Nov. 1989.Google ScholarDigital Library
- A. Razafindraibe, M.Robert, P.Maurine "Improvement of dual rail logic as a countermeasure against DPA", IFIP International Conference on Very Large Scale Integration, 2007. VLSI-SoC 2007, pp. 270--275, Oct. 2007.Google ScholarCross Ref
- S. Guilley, P. Hoogvorst, Y. Mathieu, R. Pacalet and J. Provost, "CMOS Structures Suitable for Secure Hardware," in Proc. Design, Automation and Test in Europe Conference and Exposition (DATE), pp. 1414--1415, Feb. 2004. Google ScholarDigital Library
- A. Razafindraibe, P. Maurine, M. Robert, F. Bouesse, Bertrand Folco and M. Renaudin, "Secured Structures for Secured Asynchronous QDI Circuits," in Proc. 19th International Conference on Design of Circuits and Integrated Systems (DCIS), pp. 20--26, Nov. 2004.Google Scholar
- K. Tiri and I. Verbauwhede, "Securing Encryption Algorithms against DPA at the Logic level: Next Generation Smart Cards Technology," in Proc. 5th Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 125--136, Sept. 2003.Google ScholarCross Ref
- F. Mace, F. Standaert, I. Hassoune, J.-D. Legat and J.-J. Quisquater, "A Dynamic Current Mode Logic to Counteract Power Analysis Attacks," in Proc. 19th International Conference on Design of Circuits and Integrated Systems (DCIS), Nov. 2004.Google Scholar
- K. J. Kulikowski, M. Su, A. B. Smirnov, A. Taubin, M. G. Karpovsky and D. MacDonald, "Delay Insensitive Encoding and Power Analysis: A Balancing Act," in Proc. 11th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC), pp. 116--125, Mar. 2005. Google ScholarDigital Library
- A. Razafindraibe, M. Robert and P. Maurine, "Formal Evaluation of the Robustness of Dual-Rail Logic against DPA Attacks," in Proc. 16th International Workshop on Power and Timing Modeling, Optimization and Simulation (PATMOS), pp. 634--644, Sept. 2006. Google ScholarDigital Library
- K.J. Kulikowski, V. Venkataraman, Z. Wang and A. Taubin, "Power Balanced Gates Insensitive to Routing Capacitance Mismatch," in Proc. Design, Automation and Test in Europe Conference and Exposition (DATE), pp.1280--1286, Mar 2008. Google ScholarDigital Library
Index Terms
- Evaluating the robustness of secure triple track logic through prototyping
Recommendations
Evaluation on FPGA of triple rail logic robustness against DPA and DEMA
DATE '09: Proceedings of the Conference on Design, Automation and Test in EuropeSide channel attacks are known to be efficient techniques to retrieve secret data. In this context, this paper concerns the evaluation of the robustness of triple rail logic against power and electromagnetic analyses on FPGA devices. More precisely, it ...
DES with any reduced masked rounds is not secure against side-channel attacks
The literature offers several efficient masking methods for providing resistance to side-channel attacks against iterative block ciphers, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). One of the proposed methods is to ...
Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs
Security protocols are frequently accelerated by implementing the underlying cryptographic functions in reconfigurable hardware. However, unprotected hardware implementations are susceptible to side-channel attacks, and Differential Power Analysis (DPA) ...
Comments