http://iet.metastore.ingenta.com
1887

Constant power consumption design of novel differential logic gate for immunity against differential power analysis

Constant power consumption design of novel differential logic gate for immunity against differential power analysis

For access to this article, please select a purchase option:

Buy eFirst article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Circuits, Devices & Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Differential power analysis (DPA) method is frequently used for the non-invasive side-channel attack to hack into the system. This study proposes a novel DPA immune design of basic gates, which show the dense distribution of autocorrelation and strong salience strength around 60%. The design has a highly regular structure with exactly similar evaluation path for both differential outputs, AND–NAND, and OR–NOR which can be easily extended for n-bit inputs. The design effort is minimal as the structure is such that AND–NAND design can be used to obtain OR–NOR function by just changing the placement of inputs. These gates have 0.46× less propagation delay, and 3.7× higher power consumption in comparison to other published work. The designs are simulated using Cadence tool with TowerJazz CMOS 180 nm technology with a power supply of 1.8 V.

References

    1. 1)
      • 1. Daemen, J., Rijmen, V.: ‘The first 10 years of advanced encryption’, IEEE Secur. Priv., 2010, 8, (6), pp. 7274.
    2. 2)
      • 2. Rostami, M., Koushanfar, F., Karri, R.: ‘A primer on hardware security: models, methods, and metrics’, Proc. IEEE, 2014, 102, (8), pp. 12831295.
    3. 3)
      • 3. Lawson, N.: ‘Side-channel attacks on cryptographic software’, IEEE Secur. Priv., 2009, 7, (6), pp. 6568.
    4. 4)
      • 4. Menichelli, F., Menicocci, R., Olivieri, M., et al: ‘High-level side-channel attack modeling and simulation for security-critical systems on chips’, IEEE Trans. Dependable Secur. Comput., 2008, 5, (3), pp. 164176.
    5. 5)
      • 5. Bucci, M., Giancane, L., Luzzi, R., et al: ‘Enhancing power analysis attacks against cryptographic devices’, IET Circuits Devices Syst., 2008, 2, (3), pp. 298305.
    6. 6)
      • 6. Zadeh, A., Heys, H.: ‘Simple power analysis applied to nonlinear feedback shift registers’, IET Inf. Sec., 2014, 8, (3), pp. 188198.
    7. 7)
      • 7. Kocher, P., Jaffe, J., Jun, B.: ‘Differential power analysis’. CRYPTO ‘99 Proc. of the 19th Annual Int. Cryptology Conf. on Advances in Cryptology, Santa Barbara, USA, August 1999, pp. 388397.
    8. 8)
      • 8. Prouff, E., Rivain, M., Bevan, R.: ‘Statistical analysis of second order differential power analysis’, IEEE Trans. Comput., 2009, 58, (6), pp. 799811.
    9. 9)
      • 9. Ho, C., Lai, Y., Chen, I., et al: ‘A statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems’, IEEE Commun. Mag., 2012, 50, (3), pp. 146154.
    10. 10)
      • 10. Marzouqi, H., Al-Qutayri, M., Salah, K.: ‘Review of gate-level differential power analysis and fault analysis countermeasures’, IET Inf. Sec., 2014, 8, (1), pp. 5166.
    11. 11)
      • 11. Lerman, L., Martinasek, Z., Markowitch, O.: ‘Robust profiled attacks: should the adversary trust the dataset?’, IET Inf. Sec., 2017, 11, (4), pp. 188194.
    12. 12)
      • 12. Tiri, K., Verbauwhede, I.: ‘Charge recycling sense amplifier based logic: securing low power security ICs against DPA [differential power analysis]’. Solid-State Circuits Conf., Leuven, Belgium, September 2004, pp. 179182.
    13. 13)
      • 13. Gebotys, C.: ‘A table masking countermeasure for low-energy secure embedded systems’, IEEE Trans. Very Large Scale Integr. (VLSI) Syst., 2006, 14, (7), pp. 740753.
    14. 14)
      • 14. Saputra, H., Vijaykrishnan, N., Kandemir, M., et al: ‘Masking the energy behaviour of encryption algorithms’, IEE Proc. – Comput. Digit. Tech., 2003, 150, (5), pp. 274284.
    15. 15)
      • 15. Kamoun, N., Bossuet, L., Ghazel, A.: ‘The correlated power noise generator as a low cost DPA countermeasures to secure hardware AES cipher’. Int. Conf. on Signals, Circuits and Systems, Djerba Medenine, Tunisia, November 2009, pp. 16.
    16. 16)
      • 16. Tiri, K., Akmal, M., Verbauwhede, I.: ‘A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards’. European Solid-State Circuit Conf., Florence, Italy, September 2002, pp. 403406.
    17. 17)
      • 17. Tiri, K., Verbauwhede, I.: ‘Design method for constant power consumption of differential logic circuits’. Proc. of the Design, Automation and Test in Europe, Munich, Germany, March 2005.
    18. 18)
      • 18. Avital, M., Dagan, H., Levi, I., et al: ‘DPA-secured quasi-adiabatic logic (SQAL) for low-power passive RFID tags employing S-boxes’, IEEE Trans. Circuits Syst. I, 2015, 52, (1), pp. 149156.
    19. 19)
      • 19. ‘Measuring Signal Similarities, MATLAB & Simulink Example-MathWorks India’, available at https://in.mathworks.com/help/signal/examples/measuring-signal-similarities.html, accessed 15 May 2017.
    20. 20)
      • 20. Friedman, V., Liu, S.: ‘Dynamic logic CMOS circuits’, IEEE J. Solid-State Circuits, 1984, 19, (2), pp. 263266.
    21. 21)
      • 21. Uyemura, J., : ‘CMOS differential logic families’, in Uyemura, J.: ‘CMOS logic circuit design’ (Springer, Boston, 2002, 1st edn.), pp. 435475.
    22. 22)
      • 22. Nikolic, B., Stojanovic, V., Oklobdzija, V., et al: ‘Sense amplifier-based flip-flop’. Solid-State Circuits Conf., San Francisco, USA, February 1999, pp. 282283.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cds.2018.5093
Loading

Related content

content/journals/10.1049/iet-cds.2018.5093
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address