Security refers to the ability of microelectronic systems to operate reliably in the presence/absence of malicious entities (atSide-chan, ci powver alnal.y 'is acttalcks have become a potent tacks) [2]. Typically, security in microelectronic systems is provided threat to the security of embedded cryptographic devices in miusing cryptographic algorithms (cryptosystems). Cryptographic alcroelectronic systems. In this paper, we present an overview of gorithms ensure secrecy by encrypting/decrypting information using the vairious side-channlci pover anaavis tttack' acnd defense' a secret key prior to sending/receiving information through/from an (counatermeazsures) azgazinst side-chaniel power analysis azttazcks. We insecuire communication channel. In recent years a large number of introduce these courntermveasures and present analyses based on cryptosystems are being implemented as software implementations security strength, ease of integration with EDA flows, and hardware at a higher levels of abstraction, and as hardware implementations characteristics like area, performancc andpower consumption. This (embedded cryptographic devices like smarteards). Traditionally paper is intended as a stepping stone towards developing more the imbplemetation of the cryptographic algorithmc is done inidepenpractical security-centric design methods that can be efficiently indenty with the assumption that the cryptographic algorithm being tegrated with existing commercially viable designs and EDA flows, implemented is mathematically secure from the point view of the resulting in secure as well as hardware optimal implementations of cryptanalysis. However, in recent years, security of cryptographic side-chainnel power analysis attack resistant cryptographic devices. devices has come under threat from several new and powerful attacks called side-channel power analysis (SCPA) attacks [3] [4], which target the security of the cryptographic devices with alarming I. Introduction efficiency. SCPA attacks use power consumption information from the cryptosystem to extract the secret key stored in the cryptosystem, thus essentially breaking the cryptosystem. SCPA attacks are powMlicroellectronic systemns have become part and parcell of our erfulL because they can be mounted usinlg cheap and easily available everyday lives, and are widely used in many applications and inequipmentseand can be automated while ensuring accurate results. dustries like cell phones, PDAs, smartcards automobiles, aerospace space exploration and bio-instrumentation, to name a few. The SCPA attacks can be classified as Simple Power Analysis (SPA) tremendous advances in semiconductor manufacturing technology [3] Differential Power Analysis (DPA) [3] and Higher-Order Difin recent years coupled with the ability to integrate large and ferential Power Analysis (HODPA) [5] attacks. All SCPA attacks complex applications on a single semiconductor die, and the exploit the basic weakness in cryptographic devices that power ubiquitous nature of the technology and its impact on o...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.