Side-channel resistant system-level design flow for public-key cryptography

  • Authors:
  • Kazuo Sakiyama;Elke De Mulder;Bart Preneel;Ingrid Verbauwhede

  • Affiliations:
  • Katholieke Universiteit Leuven, Leuven-Heverlee, Belgium;Katholieke Universiteit Leuven, Leuven-Heverlee, Belgium;Katholieke Universiteit Leuven, Leuven-Heverlee, Belgium;Katholieke Universiteit Leuven, Leuven-Heverlee, Belgium

  • Venue:
  • Proceedings of the 17th ACM Great Lakes symposium on VLSI
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design stage. This method is illustrated with the design of an elliptic curve cryptographic processor. It also allows to evaluate the quality of countermeasures against these attacks by evaluating hamming distances for eachsignal and each register in a partial functional domain (e.g. datapath or controller). Thus a first order side-channel-resistant design can be obtained with system-level design in which the simulation can run faster than conventional HDL simulations.