Circuits and design techniques for secure ICs resistant to side-channel attacks

Integrated circuits used for security applications, such as smart-cards, leak information. The key or other sensitive information can be guessed by monitoring the execution time, the power variation and/or the electromagnetic radiation of the integrated circuit. This class of so-called side-channel attacks doesn't need expensive equipment or intrusive monitoring to be effective. We have shown that we can obtain the secret key out of a regular standard CMOS implementation of the AES encryption algorithm by monitoring the power consumption of only 2000 encryptions. This is orders of magnitude lower than the mathematical security of 2128 possible encryption keys to break the algorithm. The root cause of this problem is that standard CMOS is power efficient and it will only consume dynamic power when nodes are switching. Mathematical solutions have been proposed that include randomization and masking techniques. Our original approach is that we address the problem at circuit level. Instead of a full custom layout, a few key modifications are incorporated in a regular synchronous CMOS standard cell design flow. We present the basis for side-channel attack resistance and adjust the library databases and constraint files of the synthesis and place & route procedures. We show the measurement results on two functionally identical co-processors which were fabricated using a TSMC 6M 0.18mum CMOS. We also discuss issues of side-channel resistance when implementing ICs in future technologies

[1]  I. Verbauwhede,et al.  A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards , 2002, Proceedings of the 28th European Solid-State Circuits Conference.

[2]  Ingrid Verbauwhede,et al.  Place and Route for Secure Standard Cell Design , 2004, CARDIS.

[3]  Patrick Schaumont,et al.  Domain-Specific Codesign for Embedded Security , 2003, Computer.

[4]  Bo-Cheng Lai,et al.  AES-based cryptographic and biometric security coprocessor IC in 0.18-/spl mu/m CMOS resistant to side-channel power analysis attacks , 2005, Digest of Technical Papers. 2005 Symposium on VLSI Circuits, 2005..

[5]  Ingrid Verbauwhede,et al.  A digital design flow for secure integrated circuits , 2006, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[6]  Ingrid Verbauwhede,et al.  Design method for constant power consumption of differential logic circuits , 2005, Design, Automation and Test in Europe.

[7]  Marc Renaudin,et al.  High security smartcards , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[8]  Ingrid Verbauwhede,et al.  A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.