Double-edge transformation for optimized power analysis suppression countermeasures
2013 (English)In: Proceedings - 16th Euromicro Conference on Digital System Design, DSD 2013, IEEE , 2013, 353-359 p.Conference paper (Refereed)
We introduce a power optimization technique for suppression countermeasures against Power Analysis attacks that can potentially be applied to any type of crypto-system implemented as a synchronous digital system. Since the power consumption of systems protected by suppression countermeasures is proportional to current peaks, we propose a simple transformation to move some of the switching activity of the crypto-system from the rising edge to the falling edge of the clock, so that current peaks are reduced. The transformation is easy to apply, requires only standard cell logic gates, has a low area overhead but can reduce the maximal working frequency of a system by at most a factor 2. We prove our method on an ASIC implementation of the Grain-80 stream cipher using SPICE-level simulation, obtaining 50% power savings compared to the non-optimized suppression countermeasure.
Place, publisher, year, edition, pages
IEEE , 2013. 353-359 p.
Countermeasure, FSR based stream cipher, Grain, Power Analysis attack
IdentifiersURN: urn:nbn:se:kth:diva-139416DOI: 10.1109/DSD.2013.45ISI: 000337235200049ScopusID: 2-s2.0-84890068197ISBN: 978-0-7695-5074-9OAI: oai:DiVA.org:kth-139416DiVA: diva2:688317
16th Euromicro Conference on Digital System Design, DSD 2013; Santander; Spain; 4 September 2013 through 6 September 2013
FunderSwedish Foundation for Strategic Research
QC 201401162014-01-162014-01-132014-08-04Bibliographically approved