2005
DOI: 10.1007/11545262_26
|View full text |Cite
|
Sign up to set email alerts
|

Prototype IC with WDDL and Differential Routing – DPA Resistance Assessment

Abstract: Abstract. Wave dynamic differential logic combined with differential routing is a working, practical technique to thwart side-channel power attacks. Measurement-based experimental results show that a differential power analysis attack on a prototype IC, fabricated in 0.18µm CMOS, does not disclose the entire secret key of the AES algorithm at 1,500,000 measurement acquisitions. This makes the attack de facto infeasible. The required number of measurements is larger than the lifetime of the secret key in most p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 118 publications
(56 citation statements)
references
References 12 publications
0
55
0
Order By: Relevance
“…2-1 [10]. Possible candidates of physical roots of trust are: true random number generators or TRNGs [21]- [22] harvest random numbers from truly physical sources of randomness and can therefore be trusted to produce highly random keys for cryptographic purposes; design styles for digital silicon circuits have been developed which minimize and ideally eliminate certain physical side channels [23]; physically unclonable functions produce unpredictable and instance-specific values and can be used to provide physically secure key generation and storage. …”
Section: Information Securitymentioning
confidence: 99%
“…2-1 [10]. Possible candidates of physical roots of trust are: true random number generators or TRNGs [21]- [22] harvest random numbers from truly physical sources of randomness and can therefore be trusted to produce highly random keys for cryptographic purposes; design styles for digital silicon circuits have been developed which minimize and ideally eliminate certain physical side channels [23]; physically unclonable functions produce unpredictable and instance-specific values and can be used to provide physically secure key generation and storage. …”
Section: Information Securitymentioning
confidence: 99%
“…less balanced) but easier to implement solutions based on standard static non-balanced gate libraries (see e.g. motivation to use WDDL from [6]). …”
Section: Dynamic Logic and Securitymentioning
confidence: 99%
“…However, for some metrics it is necessary to take certain design choices into account. We have chosen to use WDDL [16,17] as an example of a secure logic style. All figures for silicon area, critical path, and power consumption are given for an implementation based on a 0.13 μm standard-cell library.…”
Section: Security and Performance Analysismentioning
confidence: 99%
“…For the solutions employing a secure logic style (options 1 and 3), this factor solely depends on the security of the chosen logic style. For a careful implementation of WDDL in an ASIC, an empirical evaluation has shown this factor to be over 750 [16].…”
Section: Securitymentioning
confidence: 99%