Enabling Side Channel Secure FSMs in the presence of Low Power Requirements

被引:3
作者
Borowczak, Mike [1 ]
Vemuri, Ranga [1 ]
机构
[1] Univ Cincinnati, Sch Elect & Comp Syst, Digital Design Environm Lab, Cincinnati, OH 45220 USA
来源
2014 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI) | 2014年
关键词
Security; FSM; Encoding; Side Channel; Low Power; Peak Current;
D O I
10.1109/ISVLSI.2014.78
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As silicon-based technology feature sizes continue to decrease and designs remain susceptible to novel attacks designers face competing goals when creating secure, low power, integrated circuits (ICs). Often, low power designs rely on heavy minimization and optimization procedures while many secure designs use low-level duplication mechanisms to thwart attacks. An area that requires special attention, and is crucial in both realms, is the power consumption profile of Finite State Machines (FSM). This work specifically addresses the key concern of creating secure, low-power, FSM encodings. This work details a flexible, secure, encoding strategy which, in conjunction with security-based structural modifications, can provide low-power security solutions against side channel attacks. The secure encoding strategy includes methods that modify the original constraints in order to provide varying levels of protection that approach traditional low power encoding methods. Specifically, this work uses the MCNC benchmark suite to compare the state space and encoding requirement for secure (70% increase) and relaxed encoding methods (53-67% increase) aimed at increasing overall device security while reducing state-state transition cost (N-peak = 2).
引用
收藏
页码:233 / 236
页数:4
相关论文
共 19 条
[1]  
[Anonymous], 2012 IEEE INT S HARD
[2]  
[Anonymous], 1991, Techn. Rep.
[3]  
Borowczak M., 2012, RED INT SEC ENG 2012, P651
[4]  
Cao C, 2004, PROCEEDINGS OF THE EUROMICRO SYSTEMS ON DIGITAL SYSTEM DESIGN, P363
[5]   Z3: An efficient SMT solver [J].
de Moura, Leonardo ;
Bjorner, Nikolaj .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 :337-340
[6]  
Einthoven W., 1903, KNAW
[7]  
Friedman J., 1972, NSA Cryptologic Spectrum, V2, P26
[8]  
Gao F, 2003, ISLPED'03: PROCEEDINGS OF THE 2003 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, P140
[9]  
Huang S.-H., 2006, COMP AID DES 2006 IC, P33
[10]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388