Skip to main content

Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining

  • Conference paper
  • 756 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4318))

Abstract

Novel design method and design flow of block cipher coprocessor is presented based on the WDDL (Wave Dynamic Differential Logic) and Wave-Pipelining techniques. This design flow utilized the current commercially available EDA (Electronic Design Automatic) tools to a large degree. The WDDL and wave-pipelining based coprocessor not only resists power analysis, but also achieves high performance and low power consumption in nature. According to the design flow, this paper implements a DES coprocessor. The simulation results show that the novel design method does achieve high performance, low power consumption and power analysis resistant ability at the cost of chip area.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  2. Mangard, S.: Securing Implementations of Block Ciphers against Side-Channel Attacks. IAIK, Graz University of Technology. Phd. Thesis (2004)

    Google Scholar 

  3. Schneider, H.: Analysis of the Resistance of Different Logic Styles Against SPA & DPA Attacks. IAIK, Graz University of Technology. Master’s thesis (2003)

    Google Scholar 

  4. Tiri, K., Verbauwhede, I.: A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs. In: Design, Automation and Test in Europe, DATE 2005, vol. 3, pp. 58–63 (2005)

    Google Scholar 

  5. Tiri, K., Verbauwhede, I.: Place and Route for Secure Standard Cell Design. In: 6th International Conference on Smart Card Research and Advanced Applications, CARDIS 2004, pp. 143–158 (2004)

    Google Scholar 

  6. Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: Design, Automation and Test in Europe, DATE 2004, pp. 246–251 (2004)

    Google Scholar 

  7. Wong, D.C., De Micheli, G., Flynn, M.J.: Designing High-Performance Digital Circuits Using Wave Pipelining: Algorithms and Practical Experiences. IEEE Trans. On CAD of IC and Systems 12, 25–46 (1993)

    Article  Google Scholar 

  8. Burleson, W.P., Ciesielski, M., Klass, F., Liu, W.: Wave-Pipelining: A Tutorial and Research Survey. IEEE Trans. On VLSI Systems 6, 464–474 (1998)

    Article  Google Scholar 

  9. NIST: Data Encryption Standard. Federal Information Processing Standards Publication 46 (1977)

    Google Scholar 

  10. Thomas, S., Messerges, E.A., Dabbish, R.H.: Sloan:Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Trans. on Computers 51, 541–552 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tong, Y., Wang, Z., Dai, K., Lu, H. (2006). Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. In: Lipmaa, H., Yung, M., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2006. Lecture Notes in Computer Science, vol 4318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11937807_6

Download citation

  • DOI: https://doi.org/10.1007/11937807_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49608-3

  • Online ISBN: 978-3-540-49610-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics