首页> 外文会议>ACM International conference on hardware/software - codesign and system synthesis >LRCG: Latch-based Random Clock-Gating for Preventing Power Analysis Side-Channel Attacks
【24h】

LRCG: Latch-based Random Clock-Gating for Preventing Power Analysis Side-Channel Attacks

机译:LRCG:基于锁存的随机时钟门,用于防止功率分析侧通道攻击

获取原文

摘要

This paper proposes a new ASIC design flow using latch retiming and random clock-gating to cope with power analysis side-channel attacks. We cast the side-channel attack problem as a combination of retiming and clock-gating problems and solve the problems using only existing EDA tool chains. In particular, we achieve light weight time-shifting obfus-cation against DPA (Differential Power Analysis) and CPA (Correlation Power Analysis) attacks by changing when to latch randomly. Our proposed LRCG (Latch-based Random Clock-Gating) method incurs only 13% of hardware area overhead that is significantly smaller than other balancing and masking countermeasures which require 100% and 294% overhead, respectively. Our experimental results show that LRCG incurs only negligible performance and energy consumption penalty, while successfully preventing DPA and CPA attacks in all cases.
机译:本文提出了一种新的ASIC设计流程,使用闩锁重试和随机时钟门,以应对功率分析侧通道攻击。我们将侧通道攻击问题施放为重度和时钟门控问题的组合,并仅使用现有的EDA工具链解决问题。特别是,我们通过随机锁存时,实现了针对DPA(差分功率分析)和CPA(相关功率分析)攻击的轻量级时移鼠标攻击。我们所提出的LRCG(基于闩锁的随机时钟门)方法仅突出13%的硬件面积开销,明显小于其他平衡和掩蔽对策,其分别需要100%和294%的开销。我们的实验结果表明,LRCG只有可忽略不计的性能和能源消费,同时成功地防止了所有情况下的DPA和CPA攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号