Electrical and capacitive mismatches are outstanding issues in modern submicron technologies, and must be considered already during the design steps. In this work, we propose a novel hardware countermeasure based on the combination of a circuit- and a system-level methodology, which helps to reduce the data dependence of the instantaneous power consumption of cryptographic circuits. Accordingly, we define a specific design methodology, which is based on a novel data encoding and on the insertion of an on-chip filter implemented through capacitances in the layout. The new countermeasure, called time-enclosed logic (TEL), is able to hide the data dependence in a very short time interval (in the order of 100 ps in modern submicron technologies), constraining the minimum amount of bandwidth required from the attack setup. As a second and parallel contribution, we present a novel design time metric for validating our design, named frequency energy deviation, which is based on the investigation of the deviation of the frequency patterns of the current traces. By simulating a basic cell template under unbalanced capacitive condition, we show that standard dual-rail precharge logics exhibit a resilient leakage already at lower frequencies, whereas in TEL circuits the data dependence is shifted toward high frequencies. As a case study, we designed a TEL-featured cryptographic circuit using a 65-nm technology node, without any assumption on the routing of the logic gates. Correlation power analysis attacks with a Gaussian model have been then mounted against the circuit. Simulation results show that the proposed countermeasure can help to mitigate the electrical mismatches occurring in submicron technologies, offering a promising perspective for the design of power analysis resistant circuits.

Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks / Bongiovanni, Simone; Centurelli, Francesco; Scotti, Giuseppe; Trifiletti, Alessandro. - In: JOURNAL OF CRYPTOGRAPHIC ENGINEERING. - ISSN 2190-8508. - STAMPA. - 5:4(2015), pp. 269-288. [10.1007/s13389-015-0096-z]

Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks

BONGIOVANNI, SIMONE;CENTURELLI, Francesco;SCOTTI, Giuseppe;TRIFILETTI, Alessandro
2015

Abstract

Electrical and capacitive mismatches are outstanding issues in modern submicron technologies, and must be considered already during the design steps. In this work, we propose a novel hardware countermeasure based on the combination of a circuit- and a system-level methodology, which helps to reduce the data dependence of the instantaneous power consumption of cryptographic circuits. Accordingly, we define a specific design methodology, which is based on a novel data encoding and on the insertion of an on-chip filter implemented through capacitances in the layout. The new countermeasure, called time-enclosed logic (TEL), is able to hide the data dependence in a very short time interval (in the order of 100 ps in modern submicron technologies), constraining the minimum amount of bandwidth required from the attack setup. As a second and parallel contribution, we present a novel design time metric for validating our design, named frequency energy deviation, which is based on the investigation of the deviation of the frequency patterns of the current traces. By simulating a basic cell template under unbalanced capacitive condition, we show that standard dual-rail precharge logics exhibit a resilient leakage already at lower frequencies, whereas in TEL circuits the data dependence is shifted toward high frequencies. As a case study, we designed a TEL-featured cryptographic circuit using a 65-nm technology node, without any assumption on the routing of the logic gates. Correlation power analysis attacks with a Gaussian model have been then mounted against the circuit. Simulation results show that the proposed countermeasure can help to mitigate the electrical mismatches occurring in submicron technologies, offering a promising perspective for the design of power analysis resistant circuits.
2015
Side-channel attacks; correlation power analysis; decoupling capacitor; fast fourier transform; serpent s-box; VLSI
01 Pubblicazione su rivista::01a Articolo in rivista
Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks / Bongiovanni, Simone; Centurelli, Francesco; Scotti, Giuseppe; Trifiletti, Alessandro. - In: JOURNAL OF CRYPTOGRAPHIC ENGINEERING. - ISSN 2190-8508. - STAMPA. - 5:4(2015), pp. 269-288. [10.1007/s13389-015-0096-z]
File allegati a questo prodotto
File Dimensione Formato  
Bongiovanni_pre-print_Design_2015.pdf

solo utenti autorizzati

Tipologia: Documento in Pre-print (manoscritto inviato all'editore, precedente alla peer review)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.12 MB
Formato Adobe PDF
1.12 MB Adobe PDF   Contatta l'autore
Bongiovanni_post-print_Design_2015.pdf

solo gestori archivio

Tipologia: Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 2.28 MB
Formato Adobe PDF
2.28 MB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/842971
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 15
  • ???jsp.display-item.citation.isi??? 11
social impact