Security and fault tolerance evaluation of TMR–QDI circuits

作者: Ghania Ait Abdelmalek , Rezki Ziani , Rabah Mokdad

DOI: 10.1049/IET-IFS.2018.5439

关键词: Integrated circuitTriple modular redundancyFault modelBridging (networking)Power analysisReliability engineeringFault toleranceResistive touchscreenComputer scienceElectronic circuit

摘要: The authors report the results of a study on impact resistive bridging faults triple modular redundancy (TMR)-based quasi-delay-insensitive (QDI) asynchronous countermeasures, which is used to provide secure circuit against power analyses. They have carried out present CADENCE using bridges fault model. show that bridge can serious impacts security integrated circuits and it possible discover secret data. Based resistance value, there are three operating intervals circuits, in TMR-based QDI may or not function correctly presence two depending interval value.

参考文章(43)
Alain J. Martin, Mika Nystroem, Asynchronous Techniques for Noise Tolerant Nanoelectronics Defense Technical Information Center. ,(2004) , 10.21236/ADA423113
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta, Fault sensitivity analysis cryptographic hardware and embedded systems. pp. 320- 334 ,(2010) , 10.1007/978-3-642-15031-9_22
Stefan Mangard, A simple power-analysis (SPA) attack on implementations of the AES key expansion international conference on information security and cryptology. pp. 343- 358 ,(2002) , 10.1007/3-540-36552-4_24
Thomas Popp, Stefan Mangard, Masked dual-rail pre-charge logic: DPA-resistance without routing constraints cryptographic hardware and embedded systems. pp. 172- 186 ,(2005) , 10.1007/11545262_13
I. Verbauwhede, K. Tiri, M. Akmal, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards european solid-state circuits conference. pp. 403- 406 ,(2002)
Sergei Skorobogatov, Optically enhanced position-locked power analysis cryptographic hardware and embedded systems. pp. 61- 75 ,(2006) , 10.1007/11894063_6
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
Jean-Jacques Quisquater, David Samyde, ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards Lecture Notes in Computer Science. ,vol. 2140, pp. 200- 210 ,(2001) , 10.1007/3-540-45418-7_17
Daisuke Suzuki, Minoru Saeki, Security evaluation of DPA countermeasures using dual-rail pre-charge logic style cryptographic hardware and embedded systems. pp. 255- 269 ,(2006) , 10.1007/11894063_21
Dan Boneh, Richard A. DeMillo, Richard J. Lipton, On the importance of checking cryptographic protocols for faults theory and application of cryptographic techniques. pp. 37- 51 ,(1997) , 10.1007/3-540-69053-0_4