scispace - formally typeset
Proceedings ArticleDOI

DPA resistance analysis of the cryptographic S-box implementation in static CMOS and TDPL logic style

Reads0
Chats0
TLDR
This paper investigates the implementation of the S-BOX with the DPA resistant logical style, namely, the Three Phase Dual rail Pre-charge logic (TDPL) which makes the power consumption of the device insensitive to intermediate values.
Abstract
Cryptography is the art of realizing security by the strength of mathematics involved in the security algorithm, the security is compromised by the mathematics of cryptanalysis using the side channel attacks. Differential power analysis (DPA) is the most effective form of side channel power analysis, which analyses the power consumption of the cryptographic device statistically and reveals the secret information. This paper investigates the implementation of the S-BOX with the DPA resistant logical style, namely, the Three Phase Dual rail Pre-charge logic (TDPL) which makes the power consumption of the device insensitive to intermediate values. To make the power consumption constant an additional phase is added in addition to the pre-charge and evaluation phases of the three phase dual rail logic. In this paper, the implementation of the S-BOX is carried out in both the static CMOS logic and the TDPL logic to compare their DPA resistance. It is proved that the static CMOS logic is more vulnerable to power analysis than the considered three phase logic. The correlation analysis is performed to estimate the property of the DPA resistance of the S-box implementation.

read more

Citations
More filters
Journal Article

Three-phase dual-rail pre-charge logic

TL;DR: A dual-rail pre-charge logic family whose power consumption is insensitive to unbalanced load conditions thus allowing adopting a semi-custom design flow (automatic place & route) without any constraint on the routing of the complementary wires is investigated.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

TL;DR: In this paper, the authors present a comprehensive treatment of power analysis attacks and countermeasures, based on the principle that the only way to defend against such attacks is to understand them.
Book

Power Analysis Attacks: Revealing the Secrets of Smart Cards

TL;DR: This volume explains how power analysis attacks work and provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles to decide how to protect smart cards.
Proceedings ArticleDOI

A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation

TL;DR: A novel design methodology to implement a secure DPA resistant crypto processor that combines standard building blocks to make 'new' compound standard cells, which have a close to constant power consumption.
Book ChapterDOI

Introduction to Side-Channel Attacks

TL;DR: This chapter aims to introduce side-channel cryptanalysis with illustrative examples and to put forward a number of practical concerns related to their implementation and countermeasures.
Related Papers (5)