Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Authors: MILENA STANOJLOVIĆ PREDRAG PETKOVIĆ LABORATORY FOR ELECTRONIC DESIGN AUTOMATION Faculty of Electronic Engineering University of Nis.

Similar presentations


Presentation on theme: "1 Authors: MILENA STANOJLOVIĆ PREDRAG PETKOVIĆ LABORATORY FOR ELECTRONIC DESIGN AUTOMATION Faculty of Electronic Engineering University of Nis."— Presentation transcript:

1 1 Authors: MILENA STANOJLOVIĆ PREDRAG PETKOVIĆ LABORATORY FOR ELECTRONIC DESIGN AUTOMATION Faculty of Electronic Engineering University of Nis

2 2  Introduction  Strategies against SCA  Hardware protection of DPA  Resistance to SCA WDDL and NSDDL cells  Conclusion

3 3 Data protection is very important in everyday life and for that reason cryptography received a significant position. Important information and secret keys can be obtained by analyzing consumption encrypted hardware. Some of the methods that allow easier breaking of codes known as SPA (Simple Power Analysis), DPA (Differential Power Analysis) and EMA (Electromagnetic Analysis). Common to all these methods is analysis of information that leaks from physically implemented hardware.

4 4 Attacks which make use of such inherent physical leak- age are called side-channel attacks (SCA). SCA pose a major threat because the physical implementations of the cryptographic devices are difficult to control and often result in unplanned leakage of information. Typically, side-channel attacks do not require the device to be opened or access to internal parts of the system.

5 5 The countermeasures proposed against DPA can be grouped into three categories: randomizing, masking, and blinding. We are use a blinding method. One class of this method is known as Dual-rail with Pre-charge Logic (DPL). All signals are duplicated and have true and false representations. Good representatives of DPL are WDDL (Wave Dynamic Differential Logic) and NSDDL (No Short-circuit current Dynamic Differential Logic).

6 6  Using De-Morgan's laws it can be shown that OR cell is complementary to AND cell. This concept of complementary cells is used in WDDL method. The first picture shows an encrypted AND cell. During pre-charge phase all signals are set to low level. During evaluating phase only exactly one of outputs goes to the high level. Therefore only one load capacitance will charge from VDD.

7 7 The main difference between NSDDL and WDDL is in the control logic. In addition to pre-charge phase and evaluating phase, phase of capacitor discharge (dis- charge phase ) is introduced to. During pre-charge phase signals PRE and DIS are set to low logic level. Evaluating phase occurs when the PRE signal reaches a high logic level. Dis-charge phase lasts as long as both PRE and DIS signals are at high logic level.

8 8 Resistance to SCA WDDL and NSDDL cells Three types of cells are simulated. First two cells are designed using WDDL method. The first cell is designed based on standard cells. This cell gave worse results compared to second cell in which the dimensions of transistors are optimized. Therefore the first cell will be excluded from further consideration. The third cell is designed using NSDDL metod. In this case similar results are obtained as with the second cell. Also power consumption increased as it was expected. AND/NAND pri V DD =3.3V, T=300K, T r =T f =1ns, C t /C f =1 MetodSC WDDLoWDDLNSDDL 1. Average energy consumption E* 1.02pJ0.96pJ2.28pJ 2. Maximum relative deviation of energy 10.14%3.29%2.92% 3. Standard deviation 35.53fJ10.98fJ20.73fJ 4. Normalized standard deviation 3.47%1.14%0.91%

9 9 Resistance to SCA WDDL and NSDDL cells Resistance to SCA is tested for following conditions:  mismatched loads,  extremly increased temperature,  different duration of falling and rising edges of inputs signals  extreme changes of power supply voltage (Vdd)

10 10 Influence of mismatched loads to relative change in energy for a) oWDDL i b) NSDDL AND cells Influence of extreme temperature and signal dinamics to relative change in energy for a) oWDDL i b) NSDDL AND cells

11 11 Influence of extreme values of Vdd to relative change in energy for a) oWDDL i b) NSDDL AND cells All results indicate that the NSDDL cell is more resistant to SCA than optimized WDDL cell.

12 12 Cryptography hardware methods for DPA protection are based on designing structures with power consumption independent of input signals dynamic. Physical implementation of WDDL method is very hard to achieve because it requires perfectly matched loads. This problem is resolved in NSDDL method by introducing Dnor circuitry.

13 13 Thank you for your attention


Download ppt "1 Authors: MILENA STANOJLOVIĆ PREDRAG PETKOVIĆ LABORATORY FOR ELECTRONIC DESIGN AUTOMATION Faculty of Electronic Engineering University of Nis."

Similar presentations


Ads by Google