CPA Secured Data-Dependent Delay-Assignment Methodology

Itamar Levi, Alexander Fish, Osnat Keren

Research output: Contribution to journalArticlepeer-review

11 Scopus citations

Abstract

First-order and high-order correlation-power-analysis attacks have been shown to be a severe threat to cryptographic devices. As such, they serve as a security measure for evaluation and comparison of security-oriented implementations. When properly designed, data-dependent delays can be used as a barrier to these attacks. This paper introduces a security-oriented delay assignment algorithm for mitigating single and multibit attacks. The algorithm enables a reduction of the correlation between the processed data and the consumed current by utilizing the data-dependent delays as a source of correlated noise. This is done while minimizing the area overhead, propagation time, and power. We show that for the same security level this new algorithm provides X2 and X6 more area efficiency, and X1.5 and X2.25 higher frequencies than a permuted path delay assignment and random embedding of delay elements.

Original languageEnglish
Article number7527634
Pages (from-to)608-620
Number of pages13
JournalIEEE Transactions on Very Large Scale Integration (VLSI) Systems
Volume25
Issue number2
DOIs
StatePublished - 1 Feb 2017
Externally publishedYes

Keywords

  • Correlation power analysis (CPA)
  • Differential Power Analysis (DPA)
  • Power analysis
  • countermeasures
  • cryptography
  • data dependency
  • data-dependent delays
  • intracycle

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'CPA Secured Data-Dependent Delay-Assignment Methodology'. Together they form a unique fingerprint.

Cite this