Abstract
Wave dynamic differential logic combined with differential routing is a working, practical technique to thwart side-channel power attacks. Measurement-based experimental results show that a differential power analysis attack on a prototype IC, fabricated in 0.18μm CMOS, does not disclose the entire secret key of the AES algorithm at 1,500,000 measurement acquisitions. This makes the attack de facto infeasible. The required number of measurements is larger than the lifetime of the secret key in most practical systems.
Original language | English |
---|---|
Pages (from-to) | 354-365 |
Number of pages | 12 |
Journal | Lecture Notes in Computer Science |
Volume | 3659 |
DOIs | |
State | Published - 4 Nov 2005 |
Event | 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005 - Edinburgh, United Kingdom Duration: 29 Aug 2005 → 1 Sep 2005 |
Keywords
- Countermeasure
- Differential power analysis (DPA)
- Differential routing
- Dual rail with precharge
- Parasitic capacitance matching
- Side-channel attack (SCA)
- Wave dynamic differential logic (WDDL)