Security Issues in QCA Circuit Design - Power Analysis Attacks

作者: Weiqiang Liu , Saket Srivastava , Máire O’Neill , Earl E. Swartzlander

DOI: 10.1007/978-3-662-43722-3_9

关键词:

摘要: Quantum-dot cellular automata (QCA) technology has advantages of fast computation performance, high density and low power consumption. Thus, it is believed that QCA attractive for designing future digital systems. Side channel attacks including analysis have become a significant threat to the security cryptographic circuits using CMOS technology. A attack can reveal secret key cipher by measuring consumption cipher’s hardware platform while encrypting or decrypting data. As extremely when compared their counterparts, may be possible build are immune Therefore, in this chapter an investigation into both best worst case scenarios attackers carried out ascertain if such advantage. more efficient design sub-module Serpent proposed previous design. By upper bound model, first circuit (Serpent sub-module) presented. The results show scenario attackers, would vulnerable attack. However, practical greatly improved applying smoother clock. Moreover, scenario, reversible with Bennett clocking could used as natural countermeasure niche implementation architectures resistant

参考文章(54)
Eli Biham, Lars Knudsen, Ross Anderson, Serpent: A Proposal for the Advanced Encryption Standard ,(1998)
Computer Security — ESORICS 98 Springer Berlin Heidelberg. ,(1998) , 10.1007/BFB0055851
Sumio Morioka, Akashi Satoh, An Optimized S-Box Circuit Architecture for Low Power AES Design cryptographic hardware and embedded systems. pp. 172- 186 ,(2002) , 10.1007/3-540-36400-5_14
Martijn Stam, Blockcipher-Based Hashing Revisited fast software encryption. pp. 67- 83 ,(2009) , 10.1007/978-3-642-03317-9_5
Emmanuel Prouff, DPA attacks and s-boxes fast software encryption. pp. 424- 441 ,(2005) , 10.1007/11502760_29
Stefan Mangard, Elisabeth Oswald, Thomas Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards ,(2007)
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
John Kelsey, Bruce Schneier, David Wagner, Chris Hall, Side channel cryptanalysis of product ciphers Journal of Computer Security. ,vol. 8, pp. 141- 158 ,(2000) , 10.3233/JCS-2000-82-304
Craig S. Lent, P. Douglas Tougaw, Lines of interacting quantum‐dot cells: A binary wire Journal of Applied Physics. ,vol. 74, pp. 6227- 6233 ,(1993) , 10.1063/1.355196
Alexei O Orlov, Islamshah Amlani, Gary H Bernstein, Craig S Lent, Gregory L Snider, Realization of a Functional Cell for Quantum-Dot Cellular Automata Science. ,vol. 277, pp. 928- 930 ,(1997) , 10.1126/SCIENCE.277.5328.928