• DocumentCode
    1306155
  • Title

    Are QCA cryptographic circuits resistant to power analysis attack?

  • Author

    Liu, Weiqiang ; Srivastava, Saket ; Lu, Liang ; O´Neill, Máire ; Swartzlander, Earl E., Jr.

  • Author_Institution
    Inst. of Electron., Commun. & Inf. Technol., Queen´´s Univ. Belfast, Belfast, UK
  • Volume
    11
  • Issue
    6
  • fYear
    2012
  • Firstpage
    1239
  • Lastpage
    1251
  • Abstract
    Quantum-dot cellular automata (QCA) technology is expected to offer fast computation performance, high density, and low power consumption. Thus, researchers believe that QCA may be an attractive alternative to CMOS for future digital designs. Side channel attacks, such as power analysis attacks, have become a significant threat to the security of CMOS cryptographic circuits. A power analysis attack can reveal the secret key from measurements of the power consumption during the encryption and decryption process. As there is no electric current flow in QCA technology, the power consumption of QCA circuits is extremely low when compared to their CMOS counterparts. Therefore, in this paper an investigation into both the best and worst case scenarios for attackers is carried out to ascertain if QCA circuits are immune to power analysis attack. A QCA design of a submodule of the Serpent cipher is proposed. In comparison to a previous design, the proposed design is more efficient in terms of complexity, area, and latency. By using an upper bound power model, the first power analysis attack of a QCA cryptographic circuit is presented. The simulation results show that even though the power consumption is low, it can still be correlated with the correct key guess, and all possible subkeys applied to the Serpent submodule can be revealed in the best case scenario. Therefore, in theory QCA cryptographic circuits would be vulnerable to power analysis attack. However, the security of practical QCA devices can be greatly improved by applying a smoother clock. Moreover, in the worst case scenario, the design of logically reversible QCA circuits with Bennett clocking could be used as a natural countermeasure to power analysis attack. Therefore, it is believed that QCA could be a niche technology in the future for the implementation of security architectures resistant to power analysis attack.
  • Keywords
    cellular automata; cryptography; logic circuits; logic gates; quantum dots; CMOS cryptographic circuit security; QCA cryptographic circuits; Serpent cipher; Serpent submodule; decryption process; digital designs; encryption process; logic circuit; logically reversible QCA circuit design; low power consumption; power analysis attack; quantum-dot cellular automata technology; side channel attacks; upper bound power model; Clocks; Integrated circuit modeling; Power demand; Power dissipation; Upper bound; Cryptography; S-box; power analysis attack; quantum-dot cellular automata (QCA) power model; serpent cipher;
  • fLanguage
    English
  • Journal_Title
    Nanotechnology, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-125X
  • Type

    jour

  • DOI
    10.1109/TNANO.2012.2222663
  • Filename
    6323038