Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Cryptographic Hardware and Embedded Systems

CHES 2006: Cryptographic Hardware and Embedded Systems - CHES 2006 pp 384–398Cite as

  1. Home
  2. Cryptographic Hardware and Embedded Systems - CHES 2006
  3. Conference paper
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits

Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits

  • Fraidy Bouesse18,
  • Gilles Sicard18 &
  • Marc Renaudin18 
  • Conference paper
  • 2734 Accesses

  • 5 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4249)

Abstract

This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This approach exploits the logical symmetries of the QDI asynchronous blocks, particularly its data-path redundancies, to make all electrical curves used when implementing a PA attacks useless. Indeed, the idea is to average the electrical signatures of a block by randomly exchanging its data-paths during processing. To be able to implement this approach, we adopted a formal model of QDI circuits. Firstly, this formal model enables the designer to formally verify the symmetry of all paths in order to apply a path swapping method. Secondly, it offers the possibility to model the electrical signature of QDI asynchronous circuits. Finally, applying DPA on this formal model allows us to evaluate, in an early phase of the design, the circuit’s sensitivity to the relevancy of the approach. Electrical simulations performed on a DES crypto-processor confirm the efficiency of the technique.

Keywords

  • QDI Asynchronous circuits
  • Power analysis
  • Path Swapping (PS)

Chapter PDF

Download to read the full chapter text

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)

    Google Scholar 

  2. Moore, S., Anderson, R., Cunningham, P., Mullins, R., Taylor, G.: Improving Smart Card Security using Self-timed Circuits. In:Eighth International Symposium on Asynchronous Circuits and systems (ASYNC 2002), Manchester, U.K, April 8-11 (2002)

    Google Scholar 

  3. Plana, L.A., Riocreux, P.A., Bainbridge, W.J., Bardsley, A., Garside, J.D., Temple, S.: SPA - A Synthesisable Amulet Core for Smartcard Applications. In: Proceedings of the Eighth International Symposium on Asynchronous Circuits and Systems (ASYNC 2002), Manchester, April 8-11, 2002, pp. 201–210. IEEE Computer Society, Los Alamitos (2002)

    CrossRef  Google Scholar 

  4. Joshua, J., Kocher, P., Benjamin, J.: Balanced Cryptographic computational method and apparatus for leak minimization in smartcards and others Cryptosystems, EP1088295/WO9967766

    Google Scholar 

  5. Sokolov, D., Murphy, J., Bystrov, A., Yakovlev, A.: Improving the Security of Dual-Rail Circuits. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 282–297. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  6. Fournier, J.J.A., Moore, S., Li, H., Mullins, R., Taylor, G.: Security Evaluation of Asynchronous Circuits. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 137–151. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  7. Bouesse, F., Renaudin, M., Robisson, B., Beigne, E., Liardet, P.Y., Prevosto, S., Sonzogni, J.: DPA on Quasi Delay Insensitive Asynchronous circuits: Concrete Results. In: DCIS 2004, Bordeaux, France, November 24-26 (2004)

    Google Scholar 

  8. Bouesse, G.F., Renaudin, M., Dumont, S., Germain, F.: DPA on Quasi Delay Insensitive Asynchronous Circuits: Formalization and Improvement. In: DATE 2005, Munich, p. 424 (2005)

    Google Scholar 

  9. Renaudin, M.: Asynchronous circuits and systems: a promising design alternative. In: Microelectronic for Telecommunications: managing high complexity and mobility (MIGAS 2000), special issue of the Microelectronics-Engineering Journal, December 1-2, 2000, vol. 54, pp. 133–149. Elsevier Science, Amsterdam (2000)

    Google Scholar 

  10. Bouesse, F., Renaudin, M., Germain, F.: Asynchronous AES Crypto-processor Including Secured and Optimized Blocks. The Journal of Integrated Circuits and Systems (JICS) 1 (March 2004) ISSN 1807-1953

    Google Scholar 

  11. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of Power Analysis Attacks on Smartcards. In: USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10-11 (1999)

    Google Scholar 

  12. Maurine, P., Rigaud, J.B., Bouesse, F., Sicard, G., Renaudin, M.: Static Implementation of QDI Asynchronous Primitives. In: Chico, J.J., Macii, E. (eds.) PATMOS 2003. LNCS, vol. 2799, pp. 181–191. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  13. NIST, Data Encryption Standard (DES), FIPS PUB 46-2

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. TIMA Laboratory, 46 avenue Félix Viallet, F38031, Grenoble, France

    Fraidy Bouesse, Gilles Sicard & Marc Renaudin

Authors
  1. Fraidy Bouesse
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Gilles Sicard
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Marc Renaudin
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Versailles Saint-Quentin-en-Yvelines University, 45 Avenue des Etats-Unis, 78035, Versailles Cedex, France

    Louis Goubin

  2. Information Technology R&D Center, Mitsubishi Electric Corporation, 5-1-1 Ofuna Kamakura Kanagawa, Japan

    Mitsuru Matsui

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bouesse, F., Sicard, G., Renaudin, M. (2006). Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_30

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11894063_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46559-1

  • Online ISBN: 978-3-540-46561-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature