Evaluation of power-constant dual-rail logic as a protection of cryptographic applications in FPGAs

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

FPGAs are often considered for high-end applications that require embedded cryptography. These devices must thus be protected against physical attacks. However, unlike ASICs, in which custom and backend-level counter-measures can be devised, FPGAs offer less possibilities for a designer to implement counter-measures. We investigate "wave dynamic differential logic" (WDDL), a logic-level counter-measure based on leakage hiding thanks to balanced dual-rail logic. First of all, we report a CAD methodology for achieving WDDL in FPGA. An experimental security evaluation of the DES (or triple-DES) encryption algorithm in WDDL shows that the usage of positive logic is mandatory to resist to straightforward attacks. Second, we discuss how to reduce the size overhead associated with WDDL. The efficiency of some synthesizers is assessed. In the case of DES, we provide with an original heuristic to obtain substitution boxes smaller than those generated automatically with legacy ASIC synthesizers.

Original languageEnglish
Title of host publicationProceedings - The 2nd IEEE International Conference on Secure System Integration and Reliability Improvement, SSIRI 2008
Pages16-23
Number of pages8
DOIs
Publication statusPublished - 19 Sept 2008
Event2nd IEEE International Conference on Secure System Integration and Reliability Improvement, SSIRI 2008 - Yokohama, Japan
Duration: 14 Jul 200817 Jul 2008

Publication series

NameProceedings - The 2nd IEEE International Conference on Secure System Integration and Reliability Improvement, SSIRI 2008

Conference

Conference2nd IEEE International Conference on Secure System Integration and Reliability Improvement, SSIRI 2008
Country/TerritoryJapan
CityYokohama
Period14/07/0817/07/08

Fingerprint

Dive into the research topics of 'Evaluation of power-constant dual-rail logic as a protection of cryptographic applications in FPGAs'. Together they form a unique fingerprint.

Cite this