Randomized Multitopology Logic Against Differential Power Analysis

Moshe Avital, Hadar Dagan, Osnat Keren, Alexander Fish

Research output: Contribution to journalArticlepeer-review

24 Scopus citations

Abstract

Side channel attacks have become one of the most significant problems in modern digital systems. In particular, differential power analysis (DPA) has emerged as a powerful technique because it does not require any assumptions regarding the hardware implementation of a crypto-chip. In this paper, a new randomized multitopology logic (RMTL) is proposed to enhance immunity to DPA. RMTL refers to a family of dedicated security-oriented gates whose power profile cannot be predicted by external observers. Specifically, each gate of this logic can be configured in real time to operate in a different circuit topology, where each topology induces a different power profile. Immunity to DPA attacks is obtained by randomly changing each gate's topology on run time. The suggested approach can coexist with common existing countermeasures. Theoretical analysis and simulation results, conducted in a standard 40-nm technology, clearly show higher immunity to DPA attacks when using the proposed approach compared with standard CMOS implementation.

Original languageEnglish
Article number6825857
Pages (from-to)702-711
Number of pages10
JournalIEEE Transactions on Very Large Scale Integration (VLSI) Systems
Volume23
Issue number4
DOIs
StatePublished - 1 Apr 2015

Bibliographical note

Publisher Copyright:
© 1993-2012 IEEE.

Keywords

  • Advanced encryption standard (AES)
  • differential power analysis (DPA)
  • random number generator (RNG)
  • randomized multitopology logic (RMTL)

Fingerprint

Dive into the research topics of 'Randomized Multitopology Logic Against Differential Power Analysis'. Together they form a unique fingerprint.

Cite this