TY - GEN
T1 - Area optimization of cryptographic co-processors implemented in dual-rail with precharge positive logic
AU - Guilley, Sylvain
AU - Sauvage, Laurent
AU - Danger, Jean Luc
AU - Hoogvorst, Philippe
PY - 2008/11/3
Y1 - 2008/11/3
N2 - Field programmable gate arrays (FPGAs) become very popular for embedded cryptographic operations. In order to resist side-channel attacks, FPGAs must implement reasoned countermeasures. The most efficient way to mitigate attacks is to adopt a gate-level protection. Two secure gates families exist: those that "hide" and those that "mask" side-channel leakage. In this article, we detail methods to reduce the size of wave dynamic differential logic (WDDL) implementations. These circuits are designed to hide any physical leak by ensuring a data-independent activity. This study is meant to be generic, and thus applies to any 4 - 1 LUT-based FPGAs. Further optimizations can be reached by taking advantage of some FPGAs proprietary features. Our solutions include RTL code modification, synthesizer usage (potentially in a re-entrant way), and ad hoc mapping. We show that linear parts of algorithms can be delegated to a synthesizer, but that non-linear parts are better off to be handled with heuristics. We present a 23 % area gain over the state-of-the-art as for the positive WDDL triple-DES symmetric encryption algorithm.
AB - Field programmable gate arrays (FPGAs) become very popular for embedded cryptographic operations. In order to resist side-channel attacks, FPGAs must implement reasoned countermeasures. The most efficient way to mitigate attacks is to adopt a gate-level protection. Two secure gates families exist: those that "hide" and those that "mask" side-channel leakage. In this article, we detail methods to reduce the size of wave dynamic differential logic (WDDL) implementations. These circuits are designed to hide any physical leak by ensuring a data-independent activity. This study is meant to be generic, and thus applies to any 4 - 1 LUT-based FPGAs. Further optimizations can be reached by taking advantage of some FPGAs proprietary features. Our solutions include RTL code modification, synthesizer usage (potentially in a re-entrant way), and ad hoc mapping. We show that linear parts of algorithms can be delegated to a synthesizer, but that non-linear parts are better off to be handled with heuristics. We present a 23 % area gain over the state-of-the-art as for the positive WDDL triple-DES symmetric encryption algorithm.
KW - Cryptographic applications
KW - FPGA security
KW - Positive dual-rail with precharge logic
KW - Power-constant logic
KW - Side-channel attacks mitigation
KW - synthesis optimization
U2 - 10.1109/FPL.2008.4629925
DO - 10.1109/FPL.2008.4629925
M3 - Conference contribution
AN - SCOPUS:54949110597
SN - 9781424419616
T3 - Proceedings - 2008 International Conference on Field Programmable Logic and Applications, FPL
SP - 161
EP - 166
BT - Proceedings - 2008 International Conference on Field Programmable Logic and Applications, FPL
T2 - 2008 International Conference on Field Programmable Logic and Applications, FPL
Y2 - 8 September 2008 through 10 September 2008
ER -