Title :
Utilizing sub-threshold technology for the creation of secure circuits
Author :
Haider, Syed Imtiaz ; Nazhandali, Leyla
Author_Institution :
Virginia Polytech. Inst. & State Univ., Blacksburg, VA
Abstract :
Side-channel attacks on the power consumption of a circuit correlate the variations of the power consumption with the internal data processing of that circuit, and can reveal internal secrets. For example, cryptographic circuits can be power-analyzed to reveal their secret keys. The use of the subthreshold-voltage circuits to implement those circuits makes their side-channel power analysis significantly more difficult. The reduced operating voltage, as well as the proportionally larger leakage, result in power variations that are orders of magnitude less than the super-threshold case, and hence much more difficult to measure. This paper will present an analysis of subthreshold voltage technology for secure circuit design, and propose potential applications.
Keywords :
cryptography; internal data processing; internal secrets; power consumption; secure circuits; side-channel attacks; side-channel power analysis; sub-threshold technology; subthreshold voltage technology; Circuit noise; Cryptography; Electrical resistance measurement; Energy consumption; Hardware; Information security; Paper technology; Power measurement; Power system security; Threshold voltage;
Conference_Titel :
Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4244-1683-7
Electronic_ISBN :
978-1-4244-1684-4
DOI :
10.1109/ISCAS.2008.4542134