Side-channel resistant system-level design flow for public-key cryptography
Author(s) -
Kazuo Sakiyama,
Elke De Mulder,
Bart Preneel,
Ingrid Verbauwhede
Publication year - 2007
Publication title -
citeseer x (the pennsylvania state university)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/1228784.1228822
Subject(s) - datapath , side channel attack , computer science , design flow , cryptography , power analysis , hamming weight , channel (broadcasting) , key (lock) , partial evaluation , elliptic curve cryptography , embedded system , public key cryptography , hamming code , computer network , computer security , theoretical computer science , algorithm , encryption , decoding methods , block code
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design stage. This method is illustrated with the design of an elliptic curve cryptographic processor. It also allows to evaluate the quality of countermeasures against these attacks by evaluating hamming distances for eachsignal and each register in a partial functional domain (e.g. datapath or controller). Thus a first order side-channel-resistant design can be obtained with system-level design in which the simulation can run faster than conventional HDL simulations.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom