The "backend duplication" method a leakage-proof place-and-route strategy for ASICs

Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet

Research output: Contribution to journalConference articlepeer-review

Abstract

Several types of logic gates suitable for leakage-proof computations have been put forward [1,2,3,4]. This paper describes a method, called "backend duplication" to assemble secured gates into leakage-proof cryptoprocessors. To the authors' knowledge, this article is the first CAD-oriented publication to address all the aspects involved in the backend design of secured hardware. The "backend duplication" method achieves the place-and-route of differential netlists. It allows for 100 % placement density and for balanced routing of dual-rail signals. Wires of every other metal layer are free to make turns. In addition, the method does not require any modification to the design rules passed to the router. The "backend duplication" method has been implemented in 0.13 μm ASIC technology and successfully tested on various ciphers. The example of the design of a DES module resistant against side-channel attacks is described into details.

Original languageEnglish
Pages (from-to)383-397
Number of pages15
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3659
DOIs
Publication statusPublished - 1 Jan 2005
Externally publishedYes
Event7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005 - Edinburgh, United Kingdom
Duration: 29 Aug 20051 Sept 2005

Keywords

  • Differential signals
  • Information leakage
  • Secured backend

Fingerprint

Dive into the research topics of 'The "backend duplication" method a leakage-proof place-and-route strategy for ASICs'. Together they form a unique fingerprint.

Cite this