CPA Secured Data-Dependent Delay-Assignment Methodology

Research output: Contribution to journalArticlepeer-review

14 Scopus citations

Abstract

First-order and high-order correlation-power-analysis attacks have been shown to be a severe threat to cryptographic devices. As such, they serve as a security measure for evaluation and comparison of security-oriented implementations. When properly designed, data-dependent delays can be used as a barrier to these attacks. This paper introduces a security-oriented delay assignment algorithm for mitigating single and multibit attacks. The algorithm enables a reduction of the correlation between the processed data and the consumed current by utilizing the data-dependent delays as a source of correlated noise. This is done while minimizing the area overhead, propagation time, and power. We show that for the same security level this new algorithm provides X2 and X6 more area efficiency, and X1.5 and X2.25 higher frequencies than a permuted path delay assignment and random embedding of delay elements.

Original languageEnglish
Article number7527634
Pages (from-to)608-620
Number of pages13
JournalIEEE Transactions on Very Large Scale Integration (VLSI) Systems
Volume25
Issue number2
DOIs
StatePublished - Feb 2017

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Funding

The work of O. Keren was supported by the Israel Science Foundation under Grant 1200/12.

FundersFunder number
Israel Science Foundation1200/12

    Keywords

    • Correlation power analysis (CPA)
    • Differential Power Analysis (DPA)
    • Power analysis
    • countermeasures
    • cryptography
    • data dependency
    • data-dependent delays
    • intracycle

    Fingerprint

    Dive into the research topics of 'CPA Secured Data-Dependent Delay-Assignment Methodology'. Together they form a unique fingerprint.

    Cite this