Area optimization of cryptographic co-processors implemented in dual-rail with precharge positive logic

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Field programmable gate arrays (FPGAs) become very popular for embedded cryptographic operations. In order to resist side-channel attacks, FPGAs must implement reasoned countermeasures. The most efficient way to mitigate attacks is to adopt a gate-level protection. Two secure gates families exist: those that "hide" and those that "mask" side-channel leakage. In this article, we detail methods to reduce the size of wave dynamic differential logic (WDDL) implementations. These circuits are designed to hide any physical leak by ensuring a data-independent activity. This study is meant to be generic, and thus applies to any 4 - 1 LUT-based FPGAs. Further optimizations can be reached by taking advantage of some FPGAs proprietary features. Our solutions include RTL code modification, synthesizer usage (potentially in a re-entrant way), and ad hoc mapping. We show that linear parts of algorithms can be delegated to a synthesizer, but that non-linear parts are better off to be handled with heuristics. We present a 23 % area gain over the state-of-the-art as for the positive WDDL triple-DES symmetric encryption algorithm.

Original languageEnglish
Title of host publicationProceedings - 2008 International Conference on Field Programmable Logic and Applications, FPL
Pages161-166
Number of pages6
DOIs
Publication statusPublished - 3 Nov 2008
Event2008 International Conference on Field Programmable Logic and Applications, FPL - Heidelberg, Germany
Duration: 8 Sept 200810 Sept 2008

Publication series

NameProceedings - 2008 International Conference on Field Programmable Logic and Applications, FPL

Conference

Conference2008 International Conference on Field Programmable Logic and Applications, FPL
Country/TerritoryGermany
CityHeidelberg
Period8/09/0810/09/08

Keywords

  • Cryptographic applications
  • FPGA security
  • Positive dual-rail with precharge logic
  • Power-constant logic
  • Side-channel attacks mitigation
  • synthesis optimization

Fingerprint

Dive into the research topics of 'Area optimization of cryptographic co-processors implemented in dual-rail with precharge positive logic'. Together they form a unique fingerprint.

Cite this