An Asynchronous FPGA Block with Its Tech-Mapping Algorithm Dedicated to Security Applications

This paper presents an FPGA tech-mapping algorithm dedicated to security applications. The objective is to implement—on a full-custom asynchronous FPGA—secured functions that need to be robust against side-channel attacks (SCAs). The paper briefly describes the architecture of this FPGA that has been designed and prototyped in CMOS 65 nm to target various styles of asynchronous logic including 2-phase and 4-phase communication protocols and 1-of-n data encoding. This programmable architecture is designed to be electrically balanced in order to fit the security requirements. It allows fair comparisons between different styles of asynchronous implementations. In order to illustrate the FPGA flexibility and security, a case study has been implemented in 2-phase and 4-phase Quasi-Delay-Insensitive (QDI) logic.

[1]  Laurent Fesquet,et al.  A programmable logic architecture for prototyping clockless circuits , 2005, International Conference on Field Programmable Logic and Applications, 2005..

[2]  John Teifel,et al.  Highly pipelined asynchronous FPGAs , 2004, FPGA '04.

[3]  Christof Paar,et al.  How Secure Are FPGAs in Cryptographic Applications? , 2003, FPL.

[4]  M. Ward,et al.  EMV card payments - An update , 2006, Inf. Secur. Tech. Rep..

[5]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[6]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[7]  Cécile Canovas,et al.  What do S-boxes Say in Differential Side Channel Attacks? , 2005, IACR Cryptol. ePrint Arch..

[8]  Karl Papadantonakis,et al.  The Lutonium: a sub-nanojoule asynchronous 8051 microcontroller , 2003, Ninth International Symposium on Asynchronous Circuits and Systems, 2003. Proceedings..

[9]  Sylvain Guilley,et al.  Physical Design of FPGA Interconnect to Prevent Information Leakage , 2008, ARC.

[10]  Régis Leveugle,et al.  Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic , 2006, IEEE Transactions on Computers.

[11]  George S. Taylor,et al.  Improving smart card security using self-timed circuits , 2002, Proceedings Eighth International Symposium on Asynchronous Circuits and Systems.

[12]  Paul I. Pénzes,et al.  The design of an asynchronous MIPS R3000 microprocessor , 1997, Proceedings Seventeenth Conference on Advanced Research in VLSI.

[13]  M. Renaudin,et al.  FPGA architecture for multi-style asynchronous logic [full-adder example] , 2005, Design, Automation and Test in Europe.

[14]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[15]  Kapilan Maheswaran Venkatesh Akella PGA-STC: programmable gate array for implementing self-timed circuits , 1998 .

[16]  Alexandre Yakovlev,et al.  Improving the Security of Dual-Rail Circuits , 2004, CHES.

[17]  Bart Preneel,et al.  Power-analysis attack on an ASIC AES implementation , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[18]  Kiyoshi Oguri,et al.  PCA-1: a fully asynchronous, self-reconfigurable LSI , 2001, Proceedings Seventh International Symposium on Asynchronous Circuits and Systems. ASYNC 2001.

[19]  Robert Payne,et al.  Self-timed field programmmable gate array architectures , 1997 .

[20]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[21]  Alasdair McAndrew Data Encryption Standard (DES) for Sage , 2009 .

[22]  Carl Ebeling,et al.  MONTAGNE: An FPL for Synchronous and Asynchronous Circuits , 1992, FPL.

[23]  Carl Ebeling,et al.  MONTAGE: An F P G A for Synchronous and Asynchronous Circuits , .

[24]  Stamatis Vassiliadis,et al.  Future Directions of (Programmable and Reconfigurable) Embedded Processors , 2004 .

[25]  Elisabeth Oswald,et al.  Practical Template Attacks , 2004, WISA.

[26]  Bo Gao A globally asynchronous locally synchronous configurable array architecture for algorithm embeddings , 1996 .

[27]  Laurent Fesquet,et al.  State-holding in Look-Up Tables: application to asynchronous logic , 2006, 2006 IFIP International Conference on Very Large Scale Integration.

[28]  Siamak Mohammadi,et al.  AMULET3i-an asynchronous system-on-chip , 2000, Proceedings Sixth International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC 2000) (Cat. No. PR00586).

[29]  John Teifel,et al.  An asynchronous dataflow FPGA architecture , 2004, IEEE Transactions on Computers.

[30]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[31]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[32]  Sylvain Guilley,et al.  A Novel Asynchronous e-FPGA Architecture for Security Applications , 2007, 2007 International Conference on Field-Programmable Technology.