Abstract
Leakage of information through the power supply current has become a major factor in logic design. In this paper, a low cost and simple to employ design methodology dubbed pseudoasynchronous is presented. This design style combines the security advantages of asynchronous circuits with the ease of synchronous circuit design. Randomization and datadependencies (DD) are utilized to hide information leakage from the current dissipation, and hence making the critical synchronization of power supply current traces hard to do. In addition, randomization and DD are utilized for both time-domain hiding of information leakage during the active region (dynamic currents) and for amplitude-domain hiding of information leakage during the static-region (leakage currents). The main advantages of this new approach are low area cost, reduced signal, and increased noise. Circuit-level analyses show that it is harder to exploit the information leakage from internal signals of the proposed design than from CMOS-based synchronous designs or other forms of time-domain hiding countermeasures.
| Original language | English |
|---|---|
| Pages (from-to) | 82-95 |
| Number of pages | 14 |
| Journal | IEEE Transactions on Very Large Scale Integration (VLSI) Systems |
| Volume | 26 |
| Issue number | 1 |
| DOIs | |
| State | Published - Jan 2018 |
Bibliographical note
Publisher Copyright:© 2017 IEEE.
Funding
Manuscript received May 12, 2017; revised August 23, 2017; accepted September 23, 2017. Date of publication October 17, 2017; date of current version December 27, 2017. This work was supported by the Israel Science Foundation under Grant 1868/16. (Corresponding author: Itamar Levi.) The authors are with the Electrical Engineering, Faculty of Engineering, Bar-Ilan University, Ramat Gan 5290002, Israel (e-mail: [email protected]; [email protected]; [email protected]).
| Funders | Funder number |
|---|---|
| Israel Science Foundation | 1868/16 |
Keywords
- Asynchronous
- Data-dependence
- Globally asynchronous locally synchronous (GALS)
- Hiding
- Information leakage
- Power nalysis (PA)
- Pseudoasynchronous (pAsynch)
- Side-channel-analysis countermeasures
- Synchronous