ABSTRACT
Power maskable units have been proposed as a viable solution for preventing side-channel attacks to cryptoprocessors. This paper presents a novel architecture for the implementation of a class of such kinds of units, namely arithmetic components, which find wide usage in cryptographic applications and which are not suitable to traditional masking techniques. Results of extensive exploration and architectural trade-off analysis show the viability of the proposed solution.
- R. Anderson, Security Engineering: A guide for building dependable distributed systems, Wiley, 2001.]] Google ScholarDigital Library
- O. Koemmerling, M. Kuhn, "Design Principles for Tamper-Resistant Smart-Card Processors," USENIX Workshop on Smart-Card Technology, pp. 9--20, 1999.]] Google ScholarDigital Library
- P. Kocher, J. Ja, B. Jun, "Differential Power Analysis," Advances in Cryptology-CRYPTO'99, Springer-Verlag, pp. 388--397, 1999.]] Google ScholarDigital Library
- L. Shuguo, Z. Runde, G. Yuanging, "A 1024-bit RSA Crypto-Coprocessor for Smart-Cards," IEEE International Conference on ASICs, pp. 352--355, 2001.]]Google Scholar
- P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems," Advances in Cryptology-CRYPTO '96, Springer-Verlag, pp. 104--113, 1996.]] Google ScholarDigital Library
- A. Shamir, "Protecting Smart-Cards from Passive Power Analysis with Detached Power Supplies," International Workshop on Cryptographic Hardware and Embedded Systems-CHES'00 Springer-Verlag, pp. 71--77, 2000.]] Google ScholarDigital Library
- P. Rakers, L. Connell, T. Collins, D. Russel, "Secure Contactless Smart-Card ASIC with DPA Protection," IEEE Journal of Solid-State Circuits, Vol. 36, no.3, pp. 559--565, 2001.]]Google ScholarCross Ref
- T. Messerges, E. Dabbish, R. Sloan, "Examining Smart-Card Security under the Thread of Power Analysis Attacks," IEEE Transactions on Computers, Vol. 51, no.5, pp. 541--552, 2002.]] Google ScholarDigital Library
- S. Moore, R. Anderson, M. Kuhn, "Improving Smart-Card Security using Self-Timed Circuit Technology," IEEE International Symposium on Ansychnronous Circuits and Systems, pp. 120--126, 2002.]]Google Scholar
- N. Vijaykrishnan, M. Kandemir, M. Irwin, "Masking the Energy Behavior of DES Encryption," IEEE DATE-03: Design Automation and Test in Europe, 2003.]]Google Scholar
- L. Benini, A. Macii, E. Macii, E. Omerbegovic, M. Poncino, F. Pro, "Energy-Aware Design Techniques for Differential Power Analysis Protection," DAC-40: ACM/IEEE Design Automation Conference, Anaheim, CA, 2003.]] Google ScholarDigital Library
- M. Alidina, J. Monteiro, S. Devadas, A. Ghosh, M. Papaefthymiou, "Precomputation-based Sequential Logic Optimization for Low Power," IEEE Transactions on VLSI Systems, Vol. 2, No. 4, pp. 426--436, 1994.]] Google ScholarDigital Library
- J. Monteiro, S. Devadas, A. Ghosh, "Sequential Logic Optimization for Low Power Using Input-Disabling Precomputation Architectures," IEEE Transactions on CAD, Vol. 17, No. 3, pp. 279--284, 1998.]]Google ScholarDigital Library
- L. Benini, G. De Micheli, Dynamic Power Management of Electronic Systems, Kluwer Academic Publishers, 1998.]] Google ScholarDigital Library
Index Terms
- A novel architecture for power maskable arithmetic units
Recommendations
A novel identity-based strong designated verifier signature scheme
Unlike ordinary digital signatures, a designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third ...
The security of a strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. constructed a strong non-designated proxy signature scheme. In 2002, Shum and ...
A new signature scheme without random oracles
Digital signature is commonly used for authentication of a user or data. In order to ensure the security of a signature scheme, it is important to design a signature scheme with a security proof. In 1999, Gennaro et al. and Cramer et al. respectively ...
Comments