A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
نویسندگان
چکیده
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been proposed as an alternative to CMOS. However, they should only be used sparingly, since their area and power consumption are both significantly larger than for CMOS. We propose to augment a processor, realized in CMOS, with custom instruction set extensions, designed with security and performance as the primary objectives, that are realized in a protected logic. We have developed a design flow based on standard CAD tools that can automatically synthesize and place-and-route such hybrid designs. The flow is integrated into a simulation and evaluation environment to quantify the security achieved on a sound basis. Using MCML logic as a case study, we have explored different partitions of the PRESENT block cipher between protected and unprotected logic. This experiment illustrates the tradeoff between the type and amount of application-level functionality implemented in protected logic and the level of security achieved by the design. Our design approach and evaluation tools are generic and could be used to partition any algorithm using any protected logic style.
منابع مشابه
Side-Channel Protections for Cryptographic Instruction Set Extensions
Over the past few years, the microprocessor industry has introduced accelerated cryptographic capabilities through instruction set extensions. Although powerful and resistant to side-channel analysis such as cache and timing attacks, these instructions do not implicitly protect against power-based side-channel attacks, such as DPA. This paper provides a specific example with Intel’s AES-NI cryp...
متن کاملPower Analysis Resistant AES Implementation with Instruction Set Extensions
In recent years, different instruction set extensions for cryptography have been proposed for integration into general-purpose RISC processors. Both public-key and secret-key algorithms can profit tremendously from a small set of custom instructions specifically designed to accelerate performance-critical code sections. While the impact of instruction set extensions on performance and silicon a...
متن کاملDesign of Low-Power DPA-Resistant Cryptographic Functional Units
A design methodology is proposed to implement instructionset extensions for cryptographic processors and hardware accelerators with the aim to improve their potential robustness against Differential Power Analysis (DPA) attacks. The approach has a high-level component that is based on identifying the critical units and functions in a design with respect to DPA resistance, and a gate-level compo...
متن کاملAn End-to-End Design Flow for Automated Instruction Set Extension and Complex Instruction Selection based on GCC
Extensible processors are application-specific instruction set processors (ASIPs) that allow for customisation through user-defined instruction set extensions (ISE) implemented in an extended micro architecture. Traditional design flows for ISE typically involve a large number of different tools for processing of the target application written in C, ISE identification, generation, optimisation ...
متن کاملA Validated Framework for Gamified Electronic Teaching of English Language with a Systemic Approach to Instructional Design
One way of making learning English language interesting is through its gamified instruction, especially nowadays that most teachings are done virtually. Doing so, however, requires a valid framework. To construct such a framework a set of 22 peer reviewed papers on language learning and gamified teaching, from among 94 of such papers, was content analyzed and key concepts, and frequently used e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009