Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-642-01004-0_13guidebooksArticle/Chapter ViewAbstractPublication PagesBookacm-pubtype
chapter

Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology

Published: 27 March 2009 Publication History

Abstract

This paper explores the resistance of MOS Current Mode Logic (MCML) against attacks based on the observation of the power consumption. Circuits implemented in MCML, in fact, have unique characteristics both in terms of power consumption and the dependency of the power profile from the input signal pattern. Therefore, MCML is suitable to protect cryptographic hardware from Differential Power Analysis and similar side-channel attacks.
In order to demonstrate the effectiveness of different logic styles against power analysis attacks, two full cores implementing the AES algorithm were realized and implemented with CMOS and MCML technology, and a set of different types of attack was performed using power traces derived from SPICE-level simulations. Although all keys were discovered for CMOS, MCML traces did not presents characteristic that can lead to a successful attack.

References

[1]
Anis, M., Allam, M., Elmasry, M.: Impact of technology scaling on CMOS logic styles. Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions on {see also Circuits and Systems II: Express Briefs, IEEE Transactions on} 49(8), 577-588 (2000)
[2]
Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
[3]
Badel, S., Guleyupoglu, E., Inac, O., Martinez, A.P., Vietti, P., Gurkaynak, F., Leblebici, Y.: A Generic Standard Cell Design Methodology for Differential Circuit Styles. In: Design Automation and Test in Europe 2008, pp. 843-848 (2008)
[4]
Bucci, M., Guglielmo, M., Luzzi, R., Trifiletti, A.: A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. In: Macii, E., Paliouras, V., Koufopavlou, O. (eds.) PATMOS 2004. LNCS, vol. 3254, pp. 481-490. Springer, Heidelberg (2004)
[5]
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
[6]
Gonzalez, J.L., Rubio, A.: Low delta-I noise CMOS circuits based on differential logic and current limiters. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on {see also Circuits and Systems I: Regular Papers, IEEE Transactions on} 46(7), 872-876 (1999)
[7]
National Institute of Standards and Technology (NIST). Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (November 2001)
[8]
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
[9]
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
[10]
Maskai, S.R., Kiaei, S., Allstot, D.J.: Synthesis techniques for CMOS folded source-coupled logic circuits. IEEE Journal of Solid-State Circuits 27(8), 1157-1167 (1992)
[11]
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Advances in Information Security. Springer, Heidelberg (2007)
[12]
Regazzoni, F., Badel, S., Eisenbarth, T., Großschädl, J., Poschmann, A., Toprak, Z., Macchetti, M., Pozzi, L., Paar, C., Leblebici, Y., Ienne, P.: A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. In: International Symposium on Systems, Architectures, Modeling and Simulation, SAMOS VII (2007)
[13]
Tiri, K., Akmal, M., Verbauwhede, I.M.: A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In: Proceedings of the 28th European Solid-State Circuits Conference (ESSCIRC 2002), September 2002, pp. 403-406. University of Bologna, Bologna (2002)
[14]
Toprak, Z., Verma, A., Leblebici, Y., Ienne, P., Paar, C.: Design of Low-Power DPA-Resistant Cryptographic Functional Units. In: Workshop on Cryptographic Advances in Secure Hardware (2005)
[15]
Tiri, K., Verbauwhede, I.: Securing encryption algorithms against DPA at the logic level: Next generation smart card technology. In: Walter, C.D., Koç, Ç. K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 125-136. Springer, Heidelberg (2003)

Cited By

View all
  • (2018)A flip-flop for the DPA resistant three-phase dual-rail pre-charge logic familyIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2011.216586220:11(2128-2132)Online publication date: 29-Dec-2018
  • (2011)A first step towards automatic application of power analysis countermeasuresProceedings of the 48th Design Automation Conference10.1145/2024724.2024778(230-235)Online publication date: 5-Jun-2011
  • (2009)A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set ExtensionsProceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems10.1007/978-3-642-04138-9_15(205-219)Online publication date: 30-Aug-2009
  1. Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide books
    Transactions on Computational Science IV: Special Issue on Security in Computing
    March 2009
    262 pages
    ISBN:9783642010033

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 27 March 2009

    Qualifiers

    • Chapter

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)A flip-flop for the DPA resistant three-phase dual-rail pre-charge logic familyIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2011.216586220:11(2128-2132)Online publication date: 29-Dec-2018
    • (2011)A first step towards automatic application of power analysis countermeasuresProceedings of the 48th Design Automation Conference10.1145/2024724.2024778(230-235)Online publication date: 5-Jun-2011
    • (2009)A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set ExtensionsProceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems10.1007/978-3-642-04138-9_15(205-219)Online publication date: 30-Aug-2009

    View Options

    View options

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media