A Secure Asynchronous FPGA Architecture, Experimental Results and Some Debug Feedback
نویسندگان
چکیده
This article presents an asynchronous FPGA architecture for implementing cryptographic algorithms secured against physical cryptanalysis. We discuss the suitability of asynchronous reconfigurable architectures for such applications before proceeding to model the side channel and defining our objectives. The logic block architecture is presented in detail. We discuss several solutions for the interconnect architecture, and how these solutions can be ported to other flavours of interconnect (i.e. single driver). Next We discuss in detail a high speed asynchronous configuration chain architecture used to configure our asynchronous FPGA with simulation results, and we present a 3 × 3 prototype FPGA fabricated in 65 nm CMOS. Lastly we present experiments to test the high speed asynchronous configuration chain and evaluate how far our objectives have been achieved with proposed solutions, and we conclude with emphasis on complementary FPGA CAD algorithms, and the effect of CMOS variation on Side-Channel Vulnerability. Key-words: FPGA Structure, Asynchronous Logic, Secure Applications, Side-Channel Attacks, Native Countermeasures.
منابع مشابه
The Impact of the Asynchronous Online Discussion Forum on the Iranian EFL Students’ Writing Ability and Attitudes
This paper focuses on the impact of an asynchronous online discussion forum on the development of students’ ability in and attitudes toward writing in English. To do this, 60 undergraduate students majoring in English were assigned to two experimental and control groups while receiving different types of feedback. Students in the experimental group were required to take part in an asynchronous ...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملThe Effect of Asynchronous versus Computer-mediated Corrective Feedback on the Correct Use of English Articles in an EFL Context
The purpose of this study is to investigate the effects of asynchronous computer-mediated versus conventional corrective feedback on learners' writing accuracy. Three groups of learners took part in the study: asynchronous feedback group, conventional feedback group, and a control group. Asynchronous feedback group students received explicit feedback on the targeted structure via e-mail, while...
متن کاملA Secure Programmable Architecture with a Dedicated Tech-mapping Algorithm: Application to a Crypto-processor
With worldwide communications, information technology and confidentiality have become a major issue for exchanging and securing data. Nevertheless the ASIC high costs and the frequent updates in cryptographic standards used in security applications such as homeland security or banking have made the ciphering algorithms on an embedded FPGA (e-FPGA) co-processor a viable alternative. This paper p...
متن کاملArchitecture of an Asynchronous FPGA for Handshake-Component-Based Design
This paper presents a novel architecture of an asynchronous FPGA for handshake-component-based design. The handshakecomponent-based design is suitable for large-scale, complex asynchronous circuit because of its understandability. This paper proposes an areaefficient architecture of an FPGA that is suitable for handshake-componentbased asynchronous circuit. Moreover, the Four-Phase Dual-Rail en...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1103.1360 شماره
صفحات -
تاریخ انتشار 2011