Power Efficient for DPA Resistat Flip Flop Using TDPL Inverter in Reverse Logic

Authors

  • Nandhini M Electronics and Communication Engineering, Anna University, Coimbatore, India
  • Muralidharan V Electronics and Communication Engineering, Anna University, Coimbatore, India
  • Varatharaj M Electronics and Communication Engineering, Anna University, Coimbatore, India

Keywords:

Differential Power Analysis (DPA), Dual-Rail Logic, Security, Reverse Logic, Three-Phase Dual-Rail Pre-Charge Logic (TDPL)

Abstract

To design a data flip-flop consistent with the three-phase dual-rail pre-charge logic (TDPL) family. TDPL is a differential power analysis (DPA) resistant dual-rail logic style whose power consumption is insensitive to unbalanced load conditions, based on a three phase operation where, in order to obtain a constant energy consumption and also reduce the power dissipation replacing the discharge and evaluation phase by pull up and pull down networks using Reverse Logic. A part of an encryption algorithm is used as case a study to prove the effectiveness of the proposed circuit. Simulation results in a 65 nm CMOS process show an improvement in the energy consumption and power consumption.

References

Marco Bucci, Luca Giancane, Raimondo Luzzi, and Alessandro Trifiletti (2012) introduced, the “a flip-flop for the dpa resistant three-phase dual-rail pre-charge logic family”, in proc. ieee int. on very large scale integration system pp. 2128–2132.

P.Kocher, J. Jaffe, And B. Jun, “Differential Power Analysis,” In Proc.Adv. Cryptol. (Crypto), 1999, Pp. 388–397.

K. Tiri, M. Akmal, and I. Verbauwhede, “A dynamic and differentialCMOS logic with signal independent power consumption to withstand differential power analysis on smart in Proc. IEEE 28th Euro.Solid-State Circuit Conf. (ESSCIRC), 2002, pp. 403–406.

D. Sokolov, J. Murphy, A. Bystrov, and A. Yakovlev, “Improving the security of dual-rail circuits,” in Proc. Workshop Cryptograph. Hardw.Embed cards,” in Proc. IEEE 28th Euro.Solid-State Circuit Conf. (ESSCIRC), 2002, pp. 403–406.

K. Tiri and I. Verbauwhede, “A logic design methodology for a secure DPA resistant ASIC or FPGA implementation,” in Proc. Design,Autom., Test Euro. Conf. Expo. (DATE), 2004, pp. 246–251.. Syst. (CHES), 2004, pp. 282–297.

K. Tiri and I. Verbauwhede, “Place and route for secure standard cell design,” in Proc. Smart Card Res. Adv. Appl. IFIP Conf. (CARDIS),2004, pp. 143–158.

T. Popp and S. Mangard, “Masked dual-rail pre-charge logic: DPA-resistance without routing constraints,” in Proc. Workshop Cryptograph.Hardw. Embed. Syst. (CHES), 2005, pp. 172–186.

T.PoppandS.Mangard,“ImplementationaspectsoftheDPA-resistantlogic style MDPL,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS),2006, pp. 2913–2916.

T. Popp, M. Kirschbaum, T. Zefferer, and S. Mangard, “Evaluation of the masked logic style MDPL on a prototype chip,” in Proc. Workshop Cryptograph. Hardw. Embed. Syst. (CHES), 2007, pp. 81–94.

M. Bucci, L. Giancane, R. Luzzi, and A. Trifiletti, “Three-phase dual-railpre chargelogic,”in Proc.Workshop Cryptograph.Hardw Embed.Syst. (CHES), 2006, pp. 232–241.

E. Menendez and K. Mai, “Ahigh-performance, low-overhead,power-analysis-resistant, single-rail logic style,” in Proc. IEEE Int. Workshop Hardw.-Oriented Security Trust (HOST), 2008, pp. 33–36.

R. Anderson, E. Biham, and L. Knudsen, “Serpent: A Proposal for theAdvanced Encryption Standard,” NIST AES proposal, 1998. [Online].Available:http://www.cl.cam.ac.uk/ftp/users/ria14/serpent.pdf

F. Regazzoni, T. Eisenbarth, A. Poschmann, J. Großschädl, F.Gurkaynak, M. Macchetti, Z. Toprak, L. Pozzi, C. Paar, Y. Leblebici,and P. Ienne, “Evaluating resistance of MCML technology to poweranalysis attacks using a simulation-based methodology,” Trans. Computation. Sci. IV, vol. 5430, pp. 230–243, 2009.

K. J. Kulikowski, M. Su, A. Smirnov, A. Taubin, M. G. Karpovsky,and D. MacDonald, “Delay insensitive encoding and power analysis:A balancing act,” in Proc. 11th IEEE Int. Symp. Asynch. Circuits Syst.(ASYNC), 2005, pp. 116–125.

K. J. Lin, S. C. Fang, S. H. Yang, and C. C. Lo, “Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware,” in Proc. Conf. Exhib. Design, Autom. Test Euro. (DATE),2007, pp. 1–6.

K. J. Kulikowski, M. G. Karpovsky, and A. Taubin, “Power attacks on secure hardware based on early propagation of data,” in Proc. 12th IEEE Int. On-Line Test. Symp., 2006, pp. 131–138.

K. Tiri and I. Verbauwhede, “Design method for constant power con-sumption of differential logic circuits,” in Proc. Conf. Exhib. Design,Autom., Test Euro. (DATE), 2005, pp. 628–633.

Downloads

Published

2014-04-30

How to Cite

[1]
Nandhini M, Muralidharan V, and Varatharaj M, “Power Efficient for DPA Resistat Flip Flop Using TDPL Inverter in Reverse Logic”, Int. J. Comp. Sci. Eng., vol. 2, no. 4, pp. 131–135, Apr. 2014.

Issue

Section

Research Article