An Energy Efficient Xor Gate Implementation Resistant to Power Analysis Attacks
نویسنده
چکیده
Exclusive-OR (XOR) operation plays an important role in the hardware implementation of many cryptographic algorithms. Since the hardware implementation of XOR gate is vulnerable to side channel analysis such as power analysis attacks, efficient countermeasures are required. The existing approaches provide countermeasures by placing more number of transistors at key locations in the gate implementation so as to make it resilient to power analysis attacks. But, the induction of more number of transistors increases both silicon area as well as energy dissipation of the gate. In this work, an energy efficient structure is proposed for XOR gate implementation to thwart power analysis attacks. The proposed differential structure uses adiabatic logic style to achieve low energy consumption and the power analysis resistance is obtained through proper charge sharing mechanisms. The power analysis resistance is evaluated by analyzing two statistical parameters, namely Normalized Energy Deviation (NED) and Normalized Standard Deviation (NSD). Our proposed XOR gate implementation gives least values of NED and NSD when compared to the existing implementations thus proving that the proposed implementation is a more efficient countermeasure to thwart power analysis attacks.
منابع مشابه
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملNovel Defect Terminolgy Beside Evaluation And Design Fault Tolerant Logic Gates In Quantum-Dot Cellular Automata
Quantum dot Cellular Automata (QCA) is one of the important nano-level technologies for implementation of both combinational and sequential systems. QCA have the potential to achieve low power dissipation and operate high speed at THZ frequencies. However large probability of occurrence fabrication defects in QCA, is a fundamental challenge to use this emerging technology. Because of these vari...
متن کاملDifferential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard
We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, which is efficient for faults of higher multiplicity, partitions the design into linear (XOR gates only) and nonlinear blocks and uses different protection schemes for these blocks. We protect the linear blocks with linea...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملPower and Timing Side Channels for PUFs and their Efficient Exploitation
We discuss the first power and timing side channels on Strong Physical Unclonable Functions (Strong PUFs) in the literature, and describe their efficient exploitation via adapted machine learning (ML) techniques. Our method is illustrated by the example of the two currently most secure (CCS 2010, IEEE T-IFS 2013) electrical Strong PUFs, so-called XOR Arbiter PUFs and Lightweight PUFs. It allows...
متن کامل