PROJECT TITLE :

A Methodology for Optimized Design of Secure Differential Logic Gates for DPA Resistant Circuits (2014)

ABSTRACT :

Cryptocircuits can be attacked by third parties using differential power analysis (DPA), which uses power consumption dependence on data being processed to reveal critical information. To protect security devices against this issue, differential logic styles with (almost) constant power dissipation are widely used. However, to use such circuits effectively for secure applications it is necessary to eliminate any energy-secure flaw in security in the shape of memory effects that could leak information. This paper proposes a design methodology to improve pull-down logic configuration for secure differential gates by redistributing the charge stored in internal nodes and thus, removing memory effects that represent a significant threat to security. To evaluate the methodology, it was applied to the design of AND/NAND and XOR/XNOR gates in a 90 nm technology, adopting the sense amplifier based logic (SABL) style for the pull-up network. The proposed solutions leak less information than typical SABL gates, increasing security by at least two orders of magnitude and with negligible performance degradation. A simulation-based DPA attack on the Sbox9 cryptographic module used in the Kasumi algorithm, implemented with complementary metal-oxide-semiconductor, SABL and proposed gates, was performed. The results obtained illustrate that the number of measurements needed to disclose the key increased by much more than one order of magnitude when using our proposal. This paper also discusses how the effectivenness of DPA attacks is influenced by operating temperature and details how to insure energy-secure operations in the new proposals.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : RAVIR A Dataset and Methodology for the Semantic Segmentation and Quantitative Analysis ABSTRACT: The vasculature of the retina offers crucial hints that can be used in the diagnosis and ongoing monitoring of
PROJECT TITLE : Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images An Analysis-by-Synthesis (AbS) Approach ABSTRACT: Picture size reduction leads to poor perceptual quality for the secret image
PROJECT TITLE : A Fuzzy Logic Based Switching Methodology for a Cascaded H-Bridge Multilevel Inverter ABSTRACT: Fuzzy logic is used to construct a novel switching method in this letter. Conventional logic-gate design is eliminated
PROJECT TITLE :Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure - 2018ABSTRACT:This Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-link security

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry