Constant power consumption design of novel differential logic gate for immunity against differential power analysis

作者: Harjap Saini , Anu Gupta

DOI: 10.1049/IET-CDS.2018.5093

关键词:

摘要: Differential power analysis (DPA) method is frequently used for the non-invasive side-channel attack to hack into system. This study proposes a novel DPA immune design of basic gates, which show dense distribution autocorrelation and strong salience strength around 60%. The has highly regular structure with exactly similar evaluation path both differential outputs, AND-NAND, OR-NOR can be easily extended n -bit inputs. effort minimal as such that AND-NAND obtain function by just changing placement These gates have 0.46× less propagation delay, 3.7× higher consumption in comparison other published work. designs are simulated using Cadence tool TowerJazz CMOS 180 nm technology supply 1.8 V.

参考文章(19)
B. Nikolic, V. Stojanovic, V.G. Oklobdzija, Wenyan Jia, J. Chiu, M. Leung, Sense amplifier-based flip-flop international solid-state circuits conference. pp. 282- 283 ,(1999) , 10.1109/ISSCC.1999.759251
Hamad Marzouqi, Mahmoud Al-Qutayri, Khaled Salah, Review of gate-level differential power analysis and fault analysis countermeasures Iet Information Security. ,vol. 8, pp. 51- 66 ,(2014) , 10.1049/IET-IFS.2012.0319
Moshe Avital, Hadar Dagan, Itamar Levi, Osnat Keren, Alexander Fish, DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes IEEE Transactions on Circuits and Systems. ,vol. 62, pp. 149- 156 ,(2015) , 10.1109/TCSI.2014.2359720
Joan Daemen, Vincent Rijmen, The First 10 Years of Advanced Encryption ieee symposium on security and privacy. ,vol. 8, pp. 72- 74 ,(2010) , 10.1109/MSP.2010.193
M. Bucci, L. Giancane, R. Luzzi, M. Marino, G. Scotti, A. Trifiletti, Enhancing power analysis attacks against cryptographic devices Iet Circuits Devices & Systems. ,vol. 2, pp. 298- 305 ,(2008) , 10.1049/IET-CDS:20070166
H. Saputra, N. Vijaykrishnan, M. Kandemir, M.J. Irwin, R. Brooks, Masking the energy behaviour of encryption algorithms IEE Proceedings - Computers and Digital Techniques. ,vol. 150, pp. 274- 284 ,(2003) , 10.1049/IP-CDT:20030832
Nate Lawson, Side-Channel Attacks on Cryptographic Software ieee symposium on security and privacy. ,vol. 7, pp. 65- 68 ,(2009) , 10.1109/MSP.2009.165
V. Friedman, S. Liu, Dynamic logic CMOS circuits IEEE Journal of Solid-State Circuits. ,vol. 19, pp. 263- 266 ,(1984) , 10.1109/JSSC.1984.1052129
Fu-Yu Wang, Wei-Hsuan Tai, Cheng-Yuan Ho, Yuan-Cheng Lai, I-Wei Chen, Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems IEEE Communications Magazine. ,vol. 50, pp. 146- 154 ,(2012) , 10.1109/MCOM.2012.6163595