• DocumentCode
    2053499
  • Title

    Place-and-route impact on the security of DPL designs in FPGAs

  • Author

    Guilley, Sylvain ; Chaudhuri, Sumanta ; Sauvage, Laurent ; Graba, Tarik ; Danger, Jean-Luc ; Hoogvorst, Philippe ; Vong, Vinh-Nga ; Nassar, Maxime

  • Author_Institution
    Dept. COMELEC, CNRS LTCI, Barrault
  • fYear
    2008
  • fDate
    9-9 June 2008
  • Firstpage
    26
  • Lastpage
    32
  • Abstract
    Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak points of the electronic devices which implement it. These attacks, known as side-channel attacks, have proved to be very powerful in retrieving secret keys from any kind of unprotected electronic device. Amongst the various protection strategies, side-channel hiding is very popular and well studied. The principle of information hiding is to make any leak constant, thus uncorrelated to the device internal secrets. The so-called ldquodual-rail with precharge logicrdquo (DPL) style is indicated to achieve that goal. For DPL protection to be effective, it further requires a carefully balanced layout so as to obtain equal propagation delays and power consumption on both rails. In this article, we study to which extent the differential place-and-route constraints must be strict in FPGA technology. We describe placement techniques suitable for Xilinx and Altera FPGAs, and quantify the gain of balance they confer. On the one hand, we observed that Xilinx fitting tool achieves naturally good balancing results. On the other hand, the symmetry can be greatly improved with Altera devices, using a manual placement, leading to unprecedented dual netlists balancing.
  • Keywords
    cryptography; field programmable gate arrays; DPL designs; FPGA; cryptographic algorithms; dual-rail with precharge logic; place-and-route impact; secret keys; side-channel hiding; unprotected electronic device; Application specific integrated circuits; Cryptography; Energy consumption; Field programmable gate arrays; Logic devices; Page description languages; Protection; Protocols; Security; Telecommunications; WDDL; backend-level countermeasures; differential power analysis; dual-rail with precharge logic (DPL); secure logic style; side-channel attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on
  • Conference_Location
    Anaheim, CA
  • Print_ISBN
    978-1-4244-2401-6
  • Type

    conf

  • DOI
    10.1109/HST.2008.4559042
  • Filename
    4559042