International Conference on Smart Card Research and Advanced Applications

CARDIS 2011: Smart Card Research and Advanced Applications pp 151-165

Implementation and Evaluation of an SCA-Resistant Embedded Processor

  • Stefan Tillich
  • Mario Kirschbaum
  • Alexander Szekely
Conference paper

DOI: 10.1007/978-3-642-27257-8_10

Volume 7079 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Tillich S., Kirschbaum M., Szekely A. (2011) Implementation and Evaluation of an SCA-Resistant Embedded Processor. In: Prouff E. (eds) Smart Card Research and Advanced Applications. CARDIS 2011. Lecture Notes in Computer Science, vol 7079. Springer, Berlin, Heidelberg


Side-channel analysis (SCA) attacks are a threat for many embedded applications which have a need for security. With embedded processors being at the very heart of such applications, it is desirable to address SCA attacks with countermeasures which “naturally” fit deployment in those processors. This paper describes our work in implementing one such protection concept in an ASIC prototype and our results from a practical evaluation of its security. We are able to demonstrate that the basic principle of limiting the “leaking” portion of the processor works rather well to reduce the side-channel leakage. From this result we can draw valuable conclusions for future embedded processor design. In order to minimize the remaining leakage, the security concept calls for the application of a secure logic style. We used two concrete secure logic styles (iMDPL and DWDDL) in order to demonstrate this increase in security. Unfortunately, neither of these logic styles seems to do a particularly good job as we were still able to attribute SCA leakage to the secure-logic part of the processor. If a better suited logic style can be employed we believe that the overall leakage of the processor can be further reduced. Thus we deem the evaluated security concept as a viable method for protecting embedded processors.


Side-channel analysisSCA countermeasuresembedded processorsiMDPLDWDDL
Download to read the full conference paper text

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Stefan Tillich
    • 1
  • Mario Kirschbaum
    • 2
  • Alexander Szekely
    • 2
  1. 1.Computer Science DepartmentUniversity of BristolBristolUK
  2. 2.Institute for Applied Information Processing and CommunicationsGraz University of TechnologyGrazAustria