DocumentCode
443208
Title
Improving DPA security by using globally-asynchronous locally-synchronous systems
Author
Gurkaynak, Frank ; Oetiker, Stephan ; Kaeslin, Hubert ; Felber, Norbert ; Fichtner, Wolfgang
Author_Institution
Integrated Syst. Lab., ETH, Zurich, Switzerland
fYear
2005
fDate
12-16 Sept. 2005
Firstpage
407
Lastpage
410
Abstract
Side channel analysis attacks, and particularly differential power analysis (DPA), pose a serious threat to cryptographic security. This is partly because the synchronous operation of traditional cipher hardware affords a fairly good correlation between the abstract power model used during analysis and the physical circuit under attack. As opposed to this, the globally-asynchronous locally-synchronous (GALS) AES cipher circuit discussed in this paper combines operation reordering and unpredictable latencies with three asynchronous clock domains and self-varying clock cycle times. Attackers are further confused by having functional units process random dummy data when idle. The design fabricated in a 0.25 μm CMOS technology comprises 39,000 gate-equivalents, occupies approximately 1 mm2 and achieves a peak throughput of more than 256 Mb/s.
Keywords
CMOS logic circuits; asynchronous circuits; cryptography; synchronisation; 0.25 micron; 256 Mbit/s; AES cipher circuit; CMOS technology; DPA security; asynchronous clock domains; cipher hardware; cryptographic security; differential power analysis; globally-asynchronous locally-synchronous system; operation reordering; random dummy data; self-varying clock cycle times; side channel analysis; unpredictable latencies; CMOS logic circuits; Clocks; Communication system control; Cryptography; Data mining; Design methodology; Energy consumption; Hardware; Laboratories; Protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Solid-State Circuits Conference, 2005. ESSCIRC 2005. Proceedings of the 31st European
Print_ISBN
0-7803-9205-1
Type
conf
DOI
10.1109/ESSCIR.2005.1541646
Filename
1541646
Link To Document