2015
DOI: 10.1109/tcad.2015.2419621
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Reconfigurable Crypto IC With Countermeasures Against SPA, DPA, and EMA

Abstract: IndexTerms-Side-channel attack, Reconfigurable architecture, Cryptographic Coprocessor, correlation based differential analysis (CPA), electromagnetic analysis (EMA).Abstract-A secure reconfigurable cryptographic co-processor (SRCP) supporting multiple algorithms of AES, DES, RC6 and IDEA is proposed using its own reconfigurable feature to resist Side-channel attack (SCA). It is integrated into a system-on chip and fabricated in 0.18 μm CMOS process with 1.8 V supply voltage and 100 MHz max frequency. Several … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Swankoski et al [22] propose the use of a parallel architecture to achieve temporal isolation of the key. Shan et al [23] propose countermeasures to hide leakage information by utilizing idle reconfigurable processing elements to do dummy operations. Levi et al [24] propose a delay assignment algorithm that assigns buffer delays to combinational logic to implement data-dependent delays, as a means of mitigating single-bit and multi-bit CPA attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Swankoski et al [22] propose the use of a parallel architecture to achieve temporal isolation of the key. Shan et al [23] propose countermeasures to hide leakage information by utilizing idle reconfigurable processing elements to do dummy operations. Levi et al [24] propose a delay assignment algorithm that assigns buffer delays to combinational logic to implement data-dependent delays, as a means of mitigating single-bit and multi-bit CPA attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the strict mathematical structure of advance encryption standards (AES) [1], AES-based cryptosystem has been proved to immune against most conventional attacks. However, with the development of physical attacks such as side-channel attack (SCA) [2,3] and fault attacks (FA) [4], it has shown vulnerabilities for hardware implementation of AES [5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…However, in practical applications, the circuit charges may not be perfectly balanced, hence the power dissipation profile correlates to the charging and discharging of the circuit activities can easily leak out some pertinent information. In another study, the reconfigurable IC is implemented [6] to countermeasure against the CPA attack. The countermeasure technique utilized idle reconfigurable processing elements to generate dummy operations as to reduce the correlation.…”
Section: Introductionmentioning
confidence: 99%