2005 IEEE International Symposium on Circuits and Systems
DOI: 10.1109/iscas.2005.1465395
|View full text |Cite
|
Sign up to set email alerts
|

A Countermeasure against Differential Power Analysis based on Random Delay Insertion

Abstract: Differential power analysis is widely recognized as an extremely powerful and low-cost technique to extract secret information from cryptographic devices. As a consequence, DPA-countermeasures have been proposed in the technical literature ranging over every abstraction level in an embedded system, from software to transistor-level techniques. In this paper, a novel gate-level countermeasure is proposed which, exploiting the insertion of random delays in the datapath of a cryptographic processor, allows to ran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
27
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(28 citation statements)
references
References 15 publications
0
27
0
Order By: Relevance
“…Masking and randomized masking (Wang and Ha, 2013) is common method to prevent DPA. Balanced Load Dual Rail CMOS (Sokolov et al, 2005;Batina et al, 2005;Kulikowski et al, 2005;Tiri and Verbauwhede, 2005;Bucci et al, 2005), where gates are balanced so that load switching capacitance is same. This has significant area and power overhead.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Masking and randomized masking (Wang and Ha, 2013) is common method to prevent DPA. Balanced Load Dual Rail CMOS (Sokolov et al, 2005;Batina et al, 2005;Kulikowski et al, 2005;Tiri and Verbauwhede, 2005;Bucci et al, 2005), where gates are balanced so that load switching capacitance is same. This has significant area and power overhead.…”
Section: Related Workmentioning
confidence: 99%
“…This has significant area and power overhead. Random Delay Insertion (Bucci et al, 2005;Strachacki and Szczepanski, 2008), where special flip-flops are inserted to interrupt the process throughout the data path. Most of the countermeasures concentrated on use of minimum signal strength and information (Boey et al, 2010;Mazumdar et al, 2012;Durga et al, 2013).…”
Section: Related Workmentioning
confidence: 99%
“…More traces are need to distill the signal out of noise. Random delays can also be inserted at gate-level [5]. Dynamic frequency switching (DFS) [6] is another effective approach of hiding in the temporal dimension.…”
Section: Introductionmentioning
confidence: 99%
“…Another common protection method is power trace misalignment, such as using a randomized clock [2], [8], [27], inserting random delays [4] and using multiple clock domains [9]. Randomized clock countermeasures use a single system clock which switches at random discrete time instants.…”
mentioning
confidence: 99%
“…Since these countermeasures do not change the overall power consumption behavior of the circuit, but only misaligns the power consumption traces, alignment preprocessing techniques such as elastic alignment [26] and rapid alignment method (RAM) [16] could be used to defeat such countermeasures. The random delay insertion method proposed by Bucci et al [4] uses random number of delay buffers after each memory element on the data path. Since this countermeasure uses single system clock for all memory elements, the power consumption caused by the memory elements at the clock switches, which usually dominates the overall consumption, is aligned and could be exploited by the attacker.…”
mentioning
confidence: 99%