This is an open access article published by the IET under the Creative Commons Attribution -NonCommercial License (http://creativecommons.org/licenses/by-nc/3.0/)
The previously proposed charge-sharing symmetric adiabatic logic (CSSAL) in an 8-bit S-box circuit is implemented in this paper using a multi-stage positive polarity Reed–Muller representation with a composite field technique. The CSSAL and other conventional dual-rail adiabatic logics are evaluated from the view point of the transitional power fluctuation and the peak current traces in the 8-bit S-box in order to compare their resistance against side-channel attacks. A method to eliminate unwanted glitch current, the triple power clock supplies are applied to each inversion block; thus, the CSSAL S-box circuit performs uniform peak current traces and it has significant power reduction, which is applicable for high security demand and low power devices, such as smart cards, radio frequency identity tags or wireless sensors. The results are obtained from the SPICE simulation with a 0.18-μm 1.8-V standard complementary metal–oxide semiconductor technology at an operating frequency band of 1.25 KHz–70 MHz.
References
-
-
1)
-
24. Mangard, S., Thomas, P., Gammel, B.M.: ‘Side channel leakage of masked CMOS gates’. Proc. Conf. CT-RSA'05, San Francisco, 2005, pp. 351–356.
-
2)
-
26. Wang, A., Chen, M., Wang, Z., Wang, X.: ‘Fault rate analysis: Breaking masked AES hardware implementation efficiently’, IEEE Trans. Circuit Syst.–II: Express Briefs, 2013, 60, (8), pp. 517–521 (doi: 10.1109/TCSII.2013.2268379).
-
3)
-
16. Shastry, P.V.S., Agnihotri, A., Kachhwaha, D., Singh, J., Sutaone, M.S.: ‘A combinational logic implementation of S-box of AES’. Proc. IEEE 54th Int. Midwest Symp. Circuit and System, 2011, pp. 1–4.
-
4)
-
6. Alioto, M., Bongiovanni, S., Djukanovic, M., Scotti, G., Trifiletti, A.: ‘Effectiveness of leakage power analysis attacks on DPA-resistant logic styles under process variations’, IEEE Trans. Circuits Syst. I: Reg. Pap., 2014, 61, (2), pp. 429–442 (doi: 10.1109/TCSI.2013.2278350).
-
5)
-
3. Homma, N., Miyamoto, A., Aoki, T., Satoh, A., Samir, A.: ‘Comparative power analysis of modular exponentiation algorithms’, IEEE Trans. Comput., 2010, 59, (6), pp. 795–807 (doi: 10.1109/TC.2009.176).
-
6)
-
20. Tiri, K., Akmal, M., Verbauwhede, I.: ‘A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards’. Proc. 28th ESSCIRC, 2002, pp. 403–406.
-
7)
-
10. Hayashi, Y., Homma, N., Watanabe, T., Price, W.O., Radasky, W.A.: ‘Introduction to the special section on electromagnetic information security’, IEEE Trans. Electromagn. Compat., 2013, 55, (3), pp. 539–546 (doi: 10.1109/TEMC.2013.2255294).
-
8)
-
19. Kermani, M.-K., Masoleh, R.-M.: ‘Efficient and high-performance parallel hardware architecture for the AES-GCM’, IEEE Trans. Comput., 2012, 61, (8), pp. 1165–1178 (doi: 10.1109/TC.2011.125).
-
9)
-
31. Kramer, A., Denker, J.S., Flower, B., Moroney, J.: ‘Second order adiabatic computation 2N-2P and 2N-2N2P logic circuits’. Proc. of the IEEE Int. Symp. on Low Power Design, 1995, pp. 191–196.
-
10)
-
4. Alioto, M., Poli, M., Rocchi, S.: ‘Differential power analysis attacks to precharged buses: A general analysis for symmetric-key cryptographic algorithms’, IEEE Trans. Depend. Secure Comput., 2010, 7, (3), pp. 226–239 (doi: 10.1109/TDSC.2009.1).
-
11)
-
28. Monteiro, C., Takahashi, Y., Sekine, T.: ‘Charge-sharing symmetric adiabatic logic in countermeasure against power analysis attacks at cell level’, Microelectron. J., 2013, 44, (6), pp. 496–503 (doi: 10.1016/j.mejo.2013.04.003).
-
12)
-
5. Marzouqi, H., Al-Qutayri, M., Salah, K.: ‘Review of gate-level differential power analysis and fault analysis countermeasures’, IET J. Inf. Secur., 2013, 8, (1), pp. 51–66 (doi: 10.1049/iet-ifs.2012.0319).
-
13)
-
29. Athas, W.C., Svensson, L.J., Koller, J.G., Tzartzanis, N., Chou, E.Y.C.: ‘Low power digital system based on adiabatic-switching principles’, IEEE Trans. VLSI Syst., 1994, 2, (4), pp. 398–406 (doi: 10.1109/92.335009).
-
14)
-
7. Eric, B., Christophe, C., Francis, O.: ‘Correlation power analysis with a leakage model’. Proc. Sixth Int. Workshop on CHES 2004, 2004 (, 3156), pp. 16–29, .
-
15)
-
15. Chen, J.-H., Huang, S.-J., Lin, W.-C., Lu, Y.-K., Shieh, M.-D.: ‘Exploration of low-cost configurable S-box designs for AES applications’. Proc. Int. Conf. on Embedded Software and Systems, 2008, pp. 4220–4428.
-
16)
-
18. Kermani, M.-K., Masoleh, R.-M.: ‘Concurrent structure-independent fault detection schemes for the advanced encryption standard’, IEEE Trans. Comput., 2010, 59, (5), pp. 608–622 (doi: 10.1109/TC.2010.33).
-
17)
-
30. Choi, B.D., Kim, K.E., Chung, K.S., Kim, D.K.: ‘Symmetric adiabatic logic circuits against differential power analysis’, ETRI J., 2010, 32, (1), pp. 166–168 (doi: 10.4218/etrij.10.0209.0247).
-
18)
-
22. Bucci, M., Giancane, L., Luzzi, R., Trifiletti, A.: ‘Three-phase dual-rail pre-charge logic’. Proc. CHES'06, 2006 (, 4249), pp. 232–241, .
-
19)
-
8. Wu, J., Shi, Y., Choi, M.: ‘Measurement and evaluation of power analysis attacks on asynchronous S-box’, IEEE Trans. Instrum. Meas., 61, (10), pp. 2765–2775 (doi: 10.1109/TIM.2012.2200399).
-
20)
-
11. Gu, K., Wu, L., Li, X., Zhang, X.: ‘Design and implementation of an electromagnetic analysis system for smart cards’. Proc. IEEE Conf. Computational Intelligence and Security (CIS), 2011, pp. 6530–6656.
-
21)
-
27. Monteiro, C., Takahashi, Y., Sekine, T.: ‘DPA resistance of charge-sharing symmetric adiabatic logic’. Proc. of IEEE ISCAS ‘13, 2013, pp. 2581–2581.
-
22)
-
25. Thomas, P., Mangard, S.: ‘Masked dual-rail pre-charge logic: DPA-resistance without routing constraints’. Proc. CHES, 2005, pp. 172–186.
-
23)
-
23. Guilley, S., Sauvage, L., Flament, F., Vong, V.-N., Hoogvorst, P., Pacelet, R.: ‘Evaluation of power constant dual-rail logics countermeasures against DPA with design time security metrics’, IEEE Trans. Comput., 2010, 59, (9), pp. 1250–1263 (doi: 10.1109/TC.2010.104).
-
24)
-
9. De Mulder, E., Ors, S.B., Preneel, B., Verbauwhede, I.: ‘Differential electromagnetic attack on an FPGA implementation of elliptic curve cryptosystems’. Proc. World Automation Congress, 2006, pp. 1–6.
-
25)
-
13. Satoh, A., Morioka, S., Takano, K., Munetoh, S.: ‘A compact Rijndael hardware architecture with S-box optimization’. Advances in Cryptology – ASIACRYPT'01, 2001 (, 2248), pp. 239–254, .
-
26)
-
17. Wong, M.M., Wong, M.L.D., Nandi, A.K., Hijazin, I.: ‘Composite field GF(((22)2)2) advanced encryption standard (AES) S-box with algebraic normal form representation in the subfield inversion’, IET J. Circuits Devices Syst., 2011, 5, (5), pp. 471–4776 (doi: 10.1049/iet-cds.2010.0435).
-
27)
-
2. Alioto, M., Giancane, L., Scotti, G., Trifiletti, A.: ‘Leakage power analysis attacks: a novel class of attacks to nanometer cryptographic circuits’, IEEE Trans. Circuits Syst. I: Reg. Pap., 2010, 57, (2), pp. 355–367 (doi: 10.1109/TCSI.2009.2019411).
-
28)
-
21. Tiri, K., Akmal, M., Verbauwhede, I.: ‘A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation’. Proc. Design, Automation and Test in Europe Conf. and Exhibition, 2004, pp. 246–251.
-
29)
-
1. Kocher, P., Jaffe, J., Jun, B.: ‘Differential power analysis’. Proc. Int. Advances in Cryptology Conf. (CRYPTO), 1999, vol. 1666, pp. 388–397.
-
30)
-
14. Morioka, S., Satoh, A.: ‘An optimized S-box circuit architecture for low power AES design’. Proc. Fourth Int. Workshop on CHES 2002, 2002 (, 2523), pp. 172–186, .
-
31)
-
12. National Institute of Standards and Technology (NIST): ‘The advanced encryption standard (AES)’ (FIPS Publication 197, 2001). .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cds.2014.0150
Related content
content/journals/10.1049/iet-cds.2014.0150
pub_keyword,iet_inspecKeyword,pub_concept
6
6