Browse by author
Lookup NU author(s): Dr Frank Burns, Dr Alex Bystrov, Dr Albert Koelmans, Professor Alex Yakovlev
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
A new design flow for security is presented. Cryptographic circuit specifications are first refined and then mapped to a secure power-balanced library consisting of novel mixed 1-of-2 and 1-of-4 components based on N-nary logic. Logic optimisation tools are then applied to generate secure synchronous circuits for layout generation. The circuits generated are more efficient than balanced circuits generated by alternative techniques. A new method is presented for evaluating the security of such circuits. A security metric is introduced, which is based on the common selection function that is widely used in differential power analysis (DPA) attacks and a correlation measure similar to the one used in correlation power analysis (CPA) attacks. The metric enables the construction of a library of robust cryptograhic components including S-boxes that are more resistant to attack.
Author(s): Burns F, Bystrov A, Koelmans A, Yakovlev A
Publication type: Article
Publication status: Published
Journal: IET Computers and Digital Techniques
Year: 2012
Volume: 6
Issue: 2
Pages: 125-135
Print publication date: 01/03/2012
ISSN (print): 1751-8601
ISSN (electronic): 1751-861X
Publisher: The Institution of Engineering and Technology
URL: http://dx.doi.org/10.1049/iet-cdt.2010.0042
DOI: 10.1049/iet-cdt.2010.0042
Altmetrics provided by Altmetric