Back to Search Start Over

An EDA-friendly protection scheme against side-channel attacks

Authors :
Bayrak, A. G.
Velickovic, N.
Francesco Regazzoni
Novo, D.
Brisk, P.
Ienne, P.
Macii, Enrico
Source :
Scopus-Elsevier, Bayrak, AG; Velickovic, N; Regazzoni, F; Novo, D; Brisk, P; & Ienne, P. Macii, E ed. (2013). An EDA-friendly protection scheme against side-channel attacks.. DATE, 410-415. doi: 10.7873/DATE.2013.093. UC Riverside: Retrieved from: http://www.escholarship.org/uc/item/6sm4k19k
Publication Year :
2013
Publisher :
eScholarship, University of California, 2013.

Abstract

This paper introduces a generic and automated methodology to protect hardware designs from side-channel attacks in a manner that is fully compatible with commercial standard cell design flows. The paper describes a tool that artificially adds jitter to the clocks of the sequential elements of a cryptographic unit, which increases the non-determinism of signal timing, thereby making the physical device more difficult to attack. Timing constraints are then specified to commercial EDA tools, which restore the circuit functionality and efficiency while preserving the introduced randomness. The protection scheme is applied to an AES-128 hardware implementation that is synthesized using both ASIC and FPGA design flows. © 2013 EDAA.

Details

Database :
OpenAIRE
Journal :
Scopus-Elsevier, Bayrak, AG; Velickovic, N; Regazzoni, F; Novo, D; Brisk, P; & Ienne, P. Macii, E ed. (2013). An EDA-friendly protection scheme against side-channel attacks.. DATE, 410-415. doi: 10.7873/DATE.2013.093. UC Riverside: Retrieved from: http://www.escholarship.org/uc/item/6sm4k19k
Accession number :
edsair.doi.dedup.....435e35842555e2986281b477c0bc6734
Full Text :
https://doi.org/10.7873/DATE.2013.093.