Skip to main content

A Design Methodology for Secured ICs Using Dynamic Current Mode Logic

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3728))

Abstract

This paper presents principles and concepts for the secured design of cryptographic IC’s. In order to achieve a secure implementation of those structures, we propose to use a Binary Decision Diagrams (BDDs) approach to design and determine the most secured structures in Dynamic Current Mode Logic. We apply a BDD based prediction to the power consumption of some gates, validate our model using SPICE simulations, and use it to mount efficient power analysis attacks on a component of a cryptographic algorithm. Moreover, relying on our simulation results, we propose a complete methodology based on our BDD model to obtain secured IC’s, from the boolean function to the final circuit layout.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  2. Karlof, C., Wagner, D.: Hidden Markov Model Cryptanalysis. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 17–30. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Messerges, T.S.: Using second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 71–77. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Akers, S.B.: Binary Decision Diagrams. IEEE Transactions on Computers C-27(6), 509–516 (1978)

    Article  Google Scholar 

  5. Bryant, R.E.: Graph Based Algorithms for Boolean Function Manipulation. IEEE Transactions on Computers C-35(8), 677–691 (1986)

    Article  Google Scholar 

  6. Yang, C., Ciesielski, M.: BDS: A BDD-Based Logic Optimization System. In: ACM/IEEE Design Automation Conference - DAC 2000, June 2000, pp. 92–97 (2000)

    Google Scholar 

  7. Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: The Proceedings of ESSCIRC 2002, pp. 403–406 (2002)

    Google Scholar 

  8. Mace, F., Standaert, F.-X., Hassoune, I., Legat, J.-D., Quisquater, J.-J.: A Dynamic Current Mode Logic to Counteract Power Analysis Attacks, In. In: The Proceedings of DCIS 2004, pp. 186–191 (2004)

    Google Scholar 

  9. Allam, M.W., Elmasry, M.I.: Dynamic Current Mode Logic (DyCML): A New Low- Power High-Performances Logic Styles. IEEE Journal of Solid-State Circuits 36(3), 550–558 (2001)

    Article  Google Scholar 

  10. Fournier, J.J.A., Moore, S., Li, H., Mullins, R., Taylor, G.: Security Evaluation of Asynchronous Circuits. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 137–151. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Chu, K.M., Pulfrey, D.I.: Design Procedures for Differential Cascode Voltage Switch Circuits. IEEE Journal of Solid State Circuits SC-21(6), 1082–1087 (1986)

    Article  Google Scholar 

  12. Cortadella, J.: Mapping BDDs into DCVSL gates, UPC/DAC Technical Report No. RR 95/04 (February 1995)

    Google Scholar 

  13. Brier, E., Clavier, C., Olivier, F.: Optimal Statistical Power Analysis, IACR e-print archive 2003/152 (2003), http://eprint.iacr.org

  14. Barreto, P., Rijmen, R.: The KHAZAD Legacy-Level Block Cypher, NESSIE Project Home Page (2001), https://www.cosic.esat.kuleuven.ac.be/nessie

  15. Riepe, M.A., Sakallah, K.A.: Transistor Placement for Noncomplementary Digital VLSI Cell Synthesis. ACM Transactions on Design Automation of Electronic Systems 8(1), 81–107 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Macé, F., Standaert, FX., Quisquater, JJ., Legat, JD. (2005). A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. In: Paliouras, V., Vounckx, J., Verkest, D. (eds) Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation. PATMOS 2005. Lecture Notes in Computer Science, vol 3728. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556930_56

Download citation

  • DOI: https://doi.org/10.1007/11556930_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29013-1

  • Online ISBN: 978-3-540-32080-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics