Masked dual-rail precharge logic encounters state-of-the-art power analysis methods

IEEE Transactions on Very Large Scale Integration (VLSI) Systems(2012)

引用 40|浏览0
暂无评分
摘要
Latest evaluation of the state-of-the-art iMDPL logic style has shown small information leakage compared to its predecessor version MDPL. Concurrently, new advanced power analysis attacks specifically targeting iMDPL have been proposed. Up to now, these attacks are purely theoretic and have not been applied to an implementation. We present a comprehensive analysis of iMDPL, backed by real measurements collected from a 180 nm iMDPL prototype chip. We thoroughly study the extent of remaining information leakage of iMDPL by applying all relevant attacks. Our investigation shows the vulnerability of the target device, a standalone AES core, to several of the advanced attack methods. In comparison to conventional power analysis attacks, the advanced attacks need less power measurements to obtain meaningful results. With the help of logic level simulations routing imbalances between complementary mask trees are identified as a major source of leakage.
更多
查看译文
关键词
cryptography,logic design,logic simulation,iMDPL logic style,iMDPL prototype chip,information leakage,logic level simulation,masked dual-rail precharge logic,power analysis,vulnerability,AES,correlation,cryptography,delay,dual-rail precharge logic,encryption,energy consumption,iMDPL,logic design,masking,power analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要