ABSTRACT
The new generation of spintronic devices, Hybrid Spintronic-CMOS devices including Magnetic Tunnel Junction (MTJ), have been utilized to overcome Moore's law limitation as well as preserve higher performance with lower cost. However, implementing these devices as a hardware cryptosystem is vulnerable to side channel attacks (SCAs) due to the differential power at the output of the Hybrid Spintronic-CMOS device and asymmetric read/write operations in MTJ. One of the most severe SCAs is the power analysis attack (PAA), in which an attacker can observe the output current of the device and extract the secret key. In this paper, we employ the All Spin Logic Device (ASLD) to implement protected AES cryptography for the first time. More precisely, we realize that in additional to ASLD features, such as small area, non-volatile memory, high density and low operating voltage, this device has another unique feature: identical power dissipation through the switching operations. Such properties can be effectively leveraged to prevent SCA.
- X. Li, C. Yang, J. Ma, Y. Liu, and S. Yin, "Energy-efficient side-channel attack countermeasure with awareness and hybrid configuration based on it," IEEE Transactions on VLSI Systems, 2017.Google ScholarCross Ref
- P. Kocher, "Design and validation strategies for obtaining assurance in countermeasures to power analysis and related," in in Attacks, in the proceedings of the NIST Physical Security Workshop, 2005.Google Scholar
- A. Jaiswal, I. Chakraborty, and K. Roy, "Energy-efficient memory using magnetoelectric switching of ferromagnets," IEEE Magnetics Letters, vol. 8, pp. 1--5, 2017.Google ScholarCross Ref
- Y. Wang, L. Ni, C. H. Chang, and H. Yu, "Dw-aes: A domain-wall nanowire-based aes for high throughput and energy-efficient data encryption in non-volatile memory," IEEE Transactions on Information Forensics and Security, 2016.Google ScholarCross Ref
- K. J. Smith, "Methodologies for power analysis attacks on hardware implementations of aes," Thesis. Rochester Institute of Technology., 2009.Google Scholar
- F. Zhang and Z. J. Shi, "Differential and correlation power analysis attacks on hmac-whirlpool," in 2011 8th ITNG, 2011. Google ScholarDigital Library
- K. Tiri et al., "A dynamic and differential cmos logic with signal independent power consumption to withstand differential power analysis on smart cards," in Solid-State Circuits Conference, 2002.Google Scholar
- M. Khan et al., "Side-channel attack on sttram based cache for cryptographic application," in IEEE International Conference on Computer Design (ICCD), 2017.Google Scholar
- A. Moradi et al., Pushing the Limits: A Very Compact and a Threshold Implementation of AES. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.Google Scholar
- P. Liu et al., "A low overhead dpa countermeasure circuit based on ring oscillators," IEEE Transactions on Circuits and Systems II: Express Briefs, 2010. Google ScholarDigital Library
- Q. Alasad, J.-S. Yuan, and Y. Bi, "Logic locking using hybrid cmos and emerging sinw fets," Electronics, vol. 6, 2017.Google Scholar
- Q. Alasad and J. Yuan, "Logic obfuscation against ic reverse engineering attacks using plgs," in IEEE International Conference on Computer Design (ICCD), 2017.Google Scholar
- Q. Alasad, J. Yuan, and D. Fan, "Leveraging all-spin logic to improve hardware security," in Proceedings of the on GLSVLSI '17, 2017. Google ScholarDigital Library
- H. Dery, P. Dalal, L. Cywinski, and L. J. Sham, "Spin-based logic in semiconductors for reconfigurable large-scale circuits," Nature, 2007.Google Scholar
- B. Behin-Aein, D. Datta, S. Salahuddin, and S. Datta, "Proposal for an all-spin logic device with built-in memory," Nature, vol. 5, 2010.Google Scholar
- K. Y. Camsari, S. Ganguly, and S. Datta, "Modular approach to spintronics," in 2015 Scientific Reports, vol. 5.Google Scholar
- Z. Pajouhi et al., "Exploring spin-transfer-torque devices for logic applications," IEEE Transactions on CAD, 2015.Google ScholarCross Ref
- V. Rijmen et al., "Advanced encryption standard," Proceedings of Federal Information Processing Standards Publications, NIST, 2001.Google Scholar
- J. M. Renders et al., "Hybridizing genetic algorithms with hill-climbing methods for global optimization: two possible ways," in IEEE Proceedings on EC, 1994.Google Scholar
- M. G. Mankalale and S. S. Sapatnekar, "Optimized standard cells for all-spin logic," J. Emerg. Technol. Comput. Syst., vol. 13, no. 2, pp. 21:1--21:22, Nov. 2016. Google ScholarDigital Library
- K. Malbrain, "Byte-oriented-aes: A public domain byteoriented implementation of aes in c," Available: " https://code.google.com/p/byte-oriented-aes/", 2009.Google Scholar
- S. Mathew et al., "340mV--1.1V, 289Gbps/W, 2090-gate NanoAES hardware accelerator with area-optimized encrypt/decrypt GF(24)2 polynomials in 22nm tri-gate cmos," in Symposium on VLSI Circuits Digest of Technical Papers, 2014.Google Scholar
- Z. Abid et al., "Efficient cmol gate designs for cryptography applications," IEEE Transactions on Nanotechnology, 2009. Google ScholarDigital Library
- Q. Tian and S. A. Huss, "Power amount analysis: Another way to understand power traces in side channel attacks," in 2nd ICDIPC, July 2012.Google Scholar
Index Terms
- Resilient AES Against Side-Channel Attack Using All-Spin Logic
Recommendations
Resilient and Secure Hardware Devices Using ASL
Hardware and Algorithms for Efficient Machine LearningDue to the globalization of Integrated Circuit (IC) design in the semiconductor industry and the outsourcing of chip manufacturing, Third-Party Intellectual Properties (3PIPs) become vulnerable to IP piracy, reverse engineering, counterfeit IC, and ...
Leveraging All-Spin Logic to Improve Hardware Security
GLSVLSI '17: Proceedings of the on Great Lakes Symposium on VLSI 2017Due to the globalization of Integrated Circuit (IC) design in the semiconductor industry and the outsourcing of chip manufacturing, third Party Intellectual Properties (3PIPs) become vulnerable to IP piracy, reverse engineering, counterfeit IC, and ...
Combined fault and side-channel attack on protected implementations of AES
CARDIS'11: Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced ApplicationsThe contribution of this paper is twofold: (1) a novel fault injection attack against AES, based on a new fault model, is proposed. Compared to state-of-the-art attacks, this fault model advantage is to relax constraints on the fault location, and then ...
Comments