AES-based security coprocessor IC in 0.18-μm CMOS with resistance to differential power analysis side-channel attacks

被引:116
作者
Hwang, DD [1 ]
Tiri, K
Hodjat, A
Lai, BC
Yang, SL
Schallmont, P
Verbauwhede, I
机构
[1] KeyEye Commun, Irvine, CA 92618 USA
[2] Intel Corp, Hillsboro, OR 97124 USA
[3] Broadcom, Irvine, CA 92618 USA
[4] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
[5] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[6] Katholieke Univ Leuven, ESAT, COSIC, B-3000 Louvain, Belgium
关键词
Advanced Encryption Standard (AES); biometrics; cryptography; differential power analysis; security; side-channel attacks;
D O I
10.1109/JSSC.2006.870913
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring the power consumption or other information that is leaked by the switching behavior of digital CMOS gates. This paper describes a side-channel attack resistant coprocessor IC fabricated in 0.18-mu m CMOS consisting of an Advanced Encryption Standard (AES) based cryptographic engine, a fingerprint-matching engine, template storage, and an interface unit. Two functionally identical coprocessors have been fabricated on the same die. The first coprocessor was implemented using standard cells and regular routing techniques. The second coprocessor was implemented using a logic style called wave dynamic differential logic (WDDL) and a layout technique called differential routing to combat the differential power analysis (DPA) side-channel attack. Measurement-based experimental results show that a DPA attack on the insecure coprocessor requires only 8000 encryptions to disclose the entire 128-bit secret key. The same attack on the secure coprocessor does not disclose the entire secret key even after 1500 000 encryptions.
引用
收藏
页码:781 / 791
页数:11
相关论文
共 14 条
[1]  
Fournier JJA, 2003, LECT NOTES COMPUT SC, V2779, P137, DOI 10.1007/978-3-540-45238-6_12
[2]  
International Technology Roadmap for Semiconductors (ITRS), INT
[3]  
Kocher P, 2004, DES AUT CON, P753
[4]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[5]  
Lenstra AK, 2000, LECT NOTES COMPUT SC, V1751, P446
[6]  
Mangard S, 2005, LECT NOTES COMPUT SC, V3659, P157
[7]  
Mangard S, 2005, LECT NOTES COMPUT SC, V3376, P351
[8]  
Morioka S, 2004, IEEE T VLSI SYST, V12, P686, DOI [10.1109/TVLSI.2004.830936, 10.1109/tvlsi.2004.830936]
[9]  
National Institute of Standards and Technology (U.S.), ADV ENCR STAND
[10]  
OSWALD E, 2004, IACR CRYPTOLOGY EPRI