DocumentCode
880289
Title
AES-Based Security Coprocessor IC in 0.18-
CMOS With Resistance to Differential Power Analysis Side-Channel Attacks
Author
Hwang, David D. ; Tiri, Kris ; Hodjat, Alireza ; Lai, Bo-Cheng ; Yang, Shenglin ; Schaumont, Patrick ; Verbauwhede, Ingrid
Volume
41
Issue
4
fYear
2006
fDate
4/1/2006 12:00:00 AM
Firstpage
781
Lastpage
792
Abstract
Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring the power consumption or other information that is leaked by the switching behavior of digital CMOS gates. This paper describes a side-channel attack resistant coprocessor IC fabricated in 0.18-
CMOS consisting of an Advanced Encryption Standard (AES) based cryptographic engine, a fingerprint-matching engine, template storage, and an interface unit. Two functionally identical coprocessors have been fabricated on the same die. The first coprocessor was implemented using standard cells and regular routing techniques. The second coprocessor was implemented using a logic style called wave dynamic differential logic (WDDL) and a layout technique called differential routing to combat the differential power analysis (DPA) side-channel attack. Measurement-based experimental results show that a DPA attack on the insecure coprocessor requires only 8000 encryptions to disclose the entire 128-bit secret key. The same attack on the secure coprocessor does not disclose the entire secret key even after 1 500 000 encryptions.
CMOS consisting of an Advanced Encryption Standard (AES) based cryptographic engine, a fingerprint-matching engine, template storage, and an interface unit. Two functionally identical coprocessors have been fabricated on the same die. The first coprocessor was implemented using standard cells and regular routing techniques. The second coprocessor was implemented using a logic style called wave dynamic differential logic (WDDL) and a layout technique called differential routing to combat the differential power analysis (DPA) side-channel attack. Measurement-based experimental results show that a DPA attack on the insecure coprocessor requires only 8000 encryptions to disclose the entire 128-bit secret key. The same attack on the secure coprocessor does not disclose the entire secret key even after 1 500 000 encryptions.Keywords
Advanced Encryption Standard (AES); biometrics; cryptography; differential power analysis; security; side-channel attacks; CMOS integrated circuits; CMOS logic circuits; Coprocessors; Cryptography; Energy consumption; Engines; Fingerprint recognition; Image analysis; Information security; Monitoring; Advanced Encryption Standard (AES); biometrics; cryptography; differential power analysis; security; side-channel attacks;
fLanguage
English
Journal_Title
Solid-State Circuits, IEEE Journal of
Publisher
ieee
ISSN
0018-9200
Type
jour
DOI
10.1109/JSSC.2006.870913
Filename
1610622
Link To Document