Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Cryptographic Hardware and Embedded Systems

CHES 2006: Cryptographic Hardware and Embedded Systems - CHES 2006 pp 255–269Cite as

  1. Home
  2. Cryptographic Hardware and Embedded Systems - CHES 2006
  3. Conference paper
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style

Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style

  • Daisuke Suzuki18 &
  • Minoru Saeki18 
  • Conference paper
  • 3206 Accesses

  • 76 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4249)

Abstract

In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new countermeasure named Masked Dual-Rail Pre-Charge Logic (MDPL) which combine dual-rail circuits with random masking to improve Wave Dynamic Differential Logic (WDDL). The proposers of MDPL claim that it can implement secure circuits using a standard CMOS cell library without special constraints for the place-and-route because the difference of loading capacitance between all pairs of complementary logic gates in MDPL can be covered up by the random masking. In this paper, we especially focus the signal transition of the MDPL gate and evaluate the DPA-resistance of MDPL in detail. Our evaluation results show that the leakage occurs in the MDPL gates as well as WDDL gates when input signals have difference of delay time even if MDPL has an effectiveness on reducing the leakage caused by the difference of loading capacitance. Furthermore, we demonstrate the problem with different input signal delays by measurements of an FPGA and show the validity of our evaluation.

Keywords

  • Power Consumption
  • Input Signal
  • Delay Condition
  • Logic Level
  • Security Evaluation

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  2. Trichina, E.: Combinational Logic Design for AES SubByte Transformation on Masked Data, Cryptology ePrint Archive, 2003/236 (2003)

    Google Scholar 

  3. Mangard, S., Popp, T., Gammel, B.M.: Side-Channel Leakage of Masked CMOS Gates. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 351–365. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  4. Mangard, S., Pramstaller, N., Oswald, E.: Successfully Attacking Mased AES Hardware Implementation. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157–171. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  5. Suzuki, D., Saeki, M., Ichikawa, T.: Random Switching Logic: A Countermeasure against DPA based on Transition Probability, Cryptology ePrint Archive, Report 2004/346 (2004)

    Google Scholar 

  6. Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: Proc. of Design Automation and Test in Europe Conference, pp. 246–251 (2004)

    Google Scholar 

  7. Tiri, K., Verbauwhede, I.: Place and Route for Secure Stabdard Cell Design. In: CARDIS 2004, pp. 143–158 (2004)

    Google Scholar 

  8. Suzuki, D., Saeki, M., Ichikawa, T.: DPA Leakage Models for CMOS Logic Circuits. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 366–382. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  9. Popp, T., Mangard, S.: Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 172–186. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  10. Chandrakasan, A.P., Sheng, S., Brodersen, R.W.: Low Power Digital CMOS Design. IEEE Journal of Solid State Circuits 27(4), 473–484 (1992)

    CrossRef  Google Scholar 

  11. Guilley, S., Hoogvorst, P., Mathieu, Y., Pacalet, R.: The Backend Duplication Method. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 383–397. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  12. Morioka, S., Satoh, A.: An Optimized S-box Circuit Architecture for Low Power AES Design. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 172–186. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  13. Xilinx, Inc., Data sheet VirtexTM 2.5 V Field Programmable Gate Arrays, http://direct.xilinx.com/bvdocs/publications/ds003.pdf

  14. Xilinx, Inc., Software Manuals Constraints Guide, http://www.xilinx.com/support/sw_manuals/xilinx6/download/cgd.zip

Download references

Author information

Authors and Affiliations

  1. Information Technology R&D Center, Mitsubishi Electric Corporation, 5-1-1 Ofuna Kamakura, Kanagawa, 247-8501, Japan

    Daisuke Suzuki & Minoru Saeki

Authors
  1. Daisuke Suzuki
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Minoru Saeki
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Versailles Saint-Quentin-en-Yvelines University, 45 Avenue des Etats-Unis, 78035, Versailles Cedex, France

    Louis Goubin

  2. Information Technology R&D Center, Mitsubishi Electric Corporation, 5-1-1 Ofuna Kamakura Kanagawa, Japan

    Mitsuru Matsui

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Suzuki, D., Saeki, M. (2006). Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_21

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11894063_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46559-1

  • Online ISBN: 978-3-540-46561-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature