2021
DOI: 10.1109/access.2021.3090752
|View full text |Cite
|
Sign up to set email alerts
|

Masked SABL: A Long Lasting Side-Channel Protection Design Methodology

Abstract: As an outstanding cell-level countermeasure to defeat power analysis attacks, dual-rail pre-charge logics rely on balanced complementary paths. During the circuit lifetime, the gates undergo unavoidable changes due to the so-called device aging, hence imbalancing the dual rails. Here, we focus on Sense Amplifier Based Logic (SABL), and highlight the vulnerability of corresponding circuits when the device is aged. By integrating gate-level masking, we introduce a modified variant of SABL, maintaining its resist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Countermeasures against PA attacks involve hiding [14,Sec. 7] strategies, which reduce the SNR to conceal information mostly by power balancing (e.g., sense amplifier based logic (SABL) [15] and WDDL [13]) and masking [3] techniques (e.g., threshold implementation (TI)) that utilize secret sharing and multiparty computing to generate random intermediate values. In contrast, to detect FIAs, one may use concurrent error-detection (CED) schemes.…”
Section: A Background On Physical Attack Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Countermeasures against PA attacks involve hiding [14,Sec. 7] strategies, which reduce the SNR to conceal information mostly by power balancing (e.g., sense amplifier based logic (SABL) [15] and WDDL [13]) and masking [3] techniques (e.g., threshold implementation (TI)) that utilize secret sharing and multiparty computing to generate random intermediate values. In contrast, to detect FIAs, one may use concurrent error-detection (CED) schemes.…”
Section: A Background On Physical Attack Countermeasuresmentioning
confidence: 99%
“…However, the security of such protection cannot be ensured since imperfections in the activity occultation mechanism can lead to exploitable leakage arising from any gate of the netlist [54]. Moreover, balancing in dual rails can be impacted by aging leading to more leakage by increasing attack SR [15], [55]. This is the reason why masking logic is preferred.…”
Section: Present S-box Implementationsmentioning
confidence: 99%
“…As in the case of MDPL, where both hiding and masking techniques are implemented together in the same logic style to withstand DPA attacks, masked-SABL is also presented [81]. In this case, the authors include in the SABL logic style the use of a mask m to prevent the unbalance produced in the circuit connections due to aging.…”
Section: Gate-level Maskingmentioning
confidence: 99%
“…The authors conclude that the mask bit value can be determined by a first analysis of the power consumption traces. For this reason, logic styles that use both masking and hiding techniques are potentially capable of achieving better security levels, as well as resistance against aging effects, as considered in [81].…”
Section: Gate-level Maskingmentioning
confidence: 99%
“…The impact of aging on the success of power analysis attacks, in particular in the circuits equipped with dual-rail countermeasures have been studied in recent literature [9], and countermeasures to enhance the security of such circuits when device aging comes into account have been proposed in [10]. However, to the best of the authors' knowledge, there is no study in the open literature that quantitatively discusses how the security of cryptographic devices, that are under fault-injection attacks, can be affected by device aging.…”
Section: Introductionmentioning
confidence: 99%