Secured-by-design FPGA against side-channel attacks based on power consumption

dc.contributor.authorAlmohaimeed, Ziyad Mohammed
dc.contributor.supervisorSima, Mihai
dc.date.accessioned2017-08-31T19:00:25Z
dc.date.copyright2017en_US
dc.date.issued2017-08-31
dc.degree.departmentDepartment of Electrical and Computer Engineeringen_US
dc.degree.levelDoctor of Philosophy Ph.D.en_US
dc.description.abstractPower Analysis Attacks pose serious threats to hardware implementations of cryptographic systems. To retrieve the secret key, the attackers can exploit the mutual information between power consumption and processed data / operations through monitoring the power consumption of the cryptosystems. Field Programmable Gate Arrays (FPGA) have emerged as attractive implementation platforms for providing hardware-like performance and software-like flexibility for cryptosystem developers. These features come at the expense of larger power consumption, which makes FPGAs more vulnerable to power attacks. Different countermeasures have been introduced in the literature, but as they have originally been developed for Application-Specific Integrated Circuits (ASIC), mapping them onto FPGAs degrades their effectiveness. In this work, we propose a logic family based on pass transistors, which essentially consists of hardware replication, that can be used to build FPGAs with constant power consumption. Since the power consumption is no longer related to processed data and operations, a quadruple robustness to attacks based on dynamic power consumption, static power consumption, glitches, and early evaluation effect is achieved. Such a secured-by-design FPGA will relieve the cryptosystems developers from doing advanced analog design to secure the cryptosystem implementation. Our pass-transistor logic family can also be used in implementing ASICs. The silicon area overhead costs are shown to be less than prior art, which makes our FPGA attractive to cryptosystems developers.en_US
dc.description.embargo2018-07-26
dc.description.scholarlevelGraduateen_US
dc.identifier.urihttp://hdl.handle.net/1828/8522
dc.languageEnglisheng
dc.language.isoenen_US
dc.rightsAvailable to the World Wide Weben_US
dc.subjectSide-Channel Attacksen_US
dc.subjectPower analysis attacksen_US
dc.subjectSecured-by-Design FPGAen_US
dc.subjectDifferential Power Attacksen_US
dc.subjectDPAen_US
dc.subjectCorrelation Power Attacksen_US
dc.subjectCPAen_US
dc.titleSecured-by-design FPGA against side-channel attacks based on power consumptionen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Almohaimeed_Ziyad_PhD_2017.pdf
Size:
1.6 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: