Abstract
This paper presents principles and concepts for the secured design of cryptographic IC’s. In order to achieve a secure implementation of those structures, we propose to use a Binary Decision Diagrams (BDDs) approach to design and determine the most secured structures in Dynamic Current Mode Logic. We apply a BDD based prediction to the power consumption of some gates, validate our model using SPICE simulations, and use it to mount efficient power analysis attacks on a component of a cryptographic algorithm. Moreover, relying on our simulation results, we propose a complete methodology based on our BDD model to obtain secured IC’s, from the boolean function to the final circuit layout.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Karlof, C., Wagner, D.: Hidden Markov Model Cryptanalysis. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 17–30. Springer, Heidelberg (2003)
Messerges, T.S.: Using second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 71–77. Springer, Heidelberg (2000)
Akers, S.B.: Binary Decision Diagrams. IEEE Transactions on Computers C-27(6), 509–516 (1978)
Bryant, R.E.: Graph Based Algorithms for Boolean Function Manipulation. IEEE Transactions on Computers C-35(8), 677–691 (1986)
Yang, C., Ciesielski, M.: BDS: A BDD-Based Logic Optimization System. In: ACM/IEEE Design Automation Conference - DAC 2000, June 2000, pp. 92–97 (2000)
Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: The Proceedings of ESSCIRC 2002, pp. 403–406 (2002)
Mace, F., Standaert, F.-X., Hassoune, I., Legat, J.-D., Quisquater, J.-J.: A Dynamic Current Mode Logic to Counteract Power Analysis Attacks, In. In: The Proceedings of DCIS 2004, pp. 186–191 (2004)
Allam, M.W., Elmasry, M.I.: Dynamic Current Mode Logic (DyCML): A New Low- Power High-Performances Logic Styles. IEEE Journal of Solid-State Circuits 36(3), 550–558 (2001)
Fournier, J.J.A., Moore, S., Li, H., Mullins, R., Taylor, G.: Security Evaluation of Asynchronous Circuits. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 137–151. Springer, Heidelberg (2003)
Chu, K.M., Pulfrey, D.I.: Design Procedures for Differential Cascode Voltage Switch Circuits. IEEE Journal of Solid State Circuits SC-21(6), 1082–1087 (1986)
Cortadella, J.: Mapping BDDs into DCVSL gates, UPC/DAC Technical Report No. RR 95/04 (February 1995)
Brier, E., Clavier, C., Olivier, F.: Optimal Statistical Power Analysis, IACR e-print archive 2003/152 (2003), http://eprint.iacr.org
Barreto, P., Rijmen, R.: The KHAZAD Legacy-Level Block Cypher, NESSIE Project Home Page (2001), https://www.cosic.esat.kuleuven.ac.be/nessie
Riepe, M.A., Sakallah, K.A.: Transistor Placement for Noncomplementary Digital VLSI Cell Synthesis. ACM Transactions on Design Automation of Electronic Systems 8(1), 81–107 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Macé, F., Standaert, FX., Quisquater, JJ., Legat, JD. (2005). A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. In: Paliouras, V., Vounckx, J., Verkest, D. (eds) Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation. PATMOS 2005. Lecture Notes in Computer Science, vol 3728. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556930_56
Download citation
DOI: https://doi.org/10.1007/11556930_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29013-1
Online ISBN: 978-3-540-32080-7
eBook Packages: Computer ScienceComputer Science (R0)