The Switching Glitch Power Leakage Model
نویسندگان
چکیده
Power analysis attacks are based on analyzing the power consumption of the cryptographic devices while they perform the encryption operation. Correlation Power Analysis (CPA) attacks exploit the linear relation between the known power consumption and the predicted power consumption of cryptographic devices to recover keys. It has been one of the effective side channel attacks that threaten the security of CMOS circuits. However, few works consider the leakage of glitches at the logic gates. In this paper, we present a new power consumption model, namely Switching Glitch (SG) power leakage model, which not only considers the data dependent switching activities but also including glitch power consumptions in CMOS circuits. Additionally, from a theoretical point of view, we show how to estimate the glitch factor. The experiments against AES implementation validate the proposed model. Compared with CPA based on Hamming Distance model, the power traces of recovering keys have been decreased by as much as 28.9%.
منابع مشابه
Threshold Implementations
Embedded devices are used pervasively in a wide range of applications some of which require cryptographic algorithms in order to provide security. Today’s standardized algorithms are secure in the black-box model where an adversary has access to several inputs and/or outputs of the algorithm. However, sensitive information, such as the secret key used in the algorithm, can be derived from the p...
متن کاملA Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques
A design methodology of Random Switching Logic (RSL) using CMOS standard cell libraries is proposed to counter power analysis attacks against cryptographic hardware modules. The original RSL proposed in 2004 requires a unique RSL-gate for random data masking and glitch suppression to prevent secret information leakage through power traces. However, our new methodology enables to use general log...
متن کاملLeakage and Dynamic Glitch Power Minimization Using Integer Linear Programming for Vth Assignment and Path Balancing
This paper presents a novel technique, which uses integer linear programming (ILP) to minimize the leakage power in a dual-threshold static CMOS circuit by optimally placing high-threshold devices and simultaneously reduces the glitch power using the smallest number of delay elements to balance path delays. The constraint set size for the ILP model is linear in the circuit size. Experimental re...
متن کاملImpact of Gate Leakage on Efficiency of Circuit Block Switch-Off Schemes
Two different schemes to switch-off unused circuit blocks (ZigZag-cut-off scheme' and n-/p-block MTCMOS cut-off schemê '̂ ''̂ '̂ '̂ are examined in deep-submicron technologies by analytical investigation and simulation. The theoretical basis of the ZigZag-scheme is given and particular design constraints are discussed. It is shown that the power-saving benefits of the ZigZag-scheme are critically d...
متن کاملCMOS Leakage and Glitch Minimization for Power-Performance Tradeoff
A mixed integer linear programming (MILP) technique simultaneously minimizes the leakage and glitch power consumption of a static CMOS circuit for any specified input to output delay. Using dual-threshold devices the number of high-threshold devices is maximized and a minimum number of delay elements are inserted to reduce the differential path delays below the inertial delays of incident gates...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JSW
دوره 6 شماره
صفحات -
تاریخ انتشار 2011