Secured Dual Mode Logic (DML) as a countermeasure against Differential Power Analysis

Moshe Avital, Alexander Fish

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Security of the digital systems is under the threat from so called side channel attacks. In particular, Differential Power Analysis (DPA) is a powerful technique, as it does not require any assumption regarding the chip implementation of the device. In this paper, we introduce a novel countermeasure strategy to deal with DPA attacks. This approach is based on randomization methodology of the Dual Mode Logic (DML) family. This logic family basically comprises two modes of operation: static and dynamic modes, each having a different power profile. We design the desired cryptographic module using DML gates while switching randomly between operation modes of these gates. This results in power profile which is much more difficult to estimate, and therefore makes the DPA attack less effective. Simulation results, conducted in a standard 40nm technology, prove the efficiency of the proposed methodology.

Original languageEnglish
Title of host publication2014 IEEE International Symposium on Circuits and Systems, ISCAS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages810-813
Number of pages4
ISBN (Print)9781479934324
DOIs
StatePublished - 1 Jan 2014
Externally publishedYes
Event2014 IEEE International Symposium on Circuits and Systems, ISCAS 2014 - Melbourne, VIC, Australia
Duration: 1 Jun 20145 Jun 2014

Publication series

NameProceedings - IEEE International Symposium on Circuits and Systems
ISSN (Print)0271-4310

Conference

Conference2014 IEEE International Symposium on Circuits and Systems, ISCAS 2014
Country/TerritoryAustralia
CityMelbourne, VIC
Period1/06/145/06/14

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Secured Dual Mode Logic (DML) as a countermeasure against Differential Power Analysis'. Together they form a unique fingerprint.

Cite this