Skip to main content
Open Access Publications from the University of California

A design flow and evaluation framework for DPA-resistant instruction set extensions

  • Author(s): Regazzoni, F
  • Cevrero, A
  • Standaert, FX
  • Badel, S
  • Kluter, T
  • Brisk, P
  • Leblebici, Y
  • Ienne, P
  • Editor(s): Clavier, Christophe
  • Gaj, Kris
  • et al.

Published Web Location
No data is associated with this publication.

Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been proposed as an alternative to CMOS. However, they should only be used sparingly, since their area and power consumption are both significantly larger than for CMOS. We propose to augment a processor, realized in CMOS, with custom instruction set extensions, designed with security and performance as the primary objectives, that are realized in a protected logic. We have developed a design flow based on standard CAD tools that can automatically synthesize and place-and-route such hybrid designs. The flow is integrated into a simulation and evaluation environment to quantify the security achieved on a sound basis. Using MCML logic as a case study, we have explored different partitions of the PRESENT block cipher between protected and unprotected logic. This experiment illustrates the tradeoff between the type and amount of application-level functionality implemented in protected logic and the level of security achieved by the design. Our design approach and evaluation tools are generic and could be used to partition any algorithm using any protected logic style. © 2009 Springer.

Many UC-authored scholarly publications are freely available on this site because of the UC's open access policies. Let us know how this access is important for you.

Item not freely available? Link broken?
Report a problem accessing this item