The Community for Technology Leaders
Green Image
Attacks based on a differential power analysis (DPA) are a main threat when designing cryptographic functions for implementation on chip-cards. In this paper, a dynamic and differential look-up table (LUT) is presented and evaluated on a case study simulation. The proposed circuit shows a power consumption independent from the input data and can be employed to implement combinatorial functions in cryptographic processors when a high resistance against tampering is required. A typical application is the design of non-linear functions (e.g. substitution boxes) since protecting them with less expensive countermeasures (e.g. random masking) implies a significant overhead. In the adopted case study, a 1.02% spread in the power consumption has been obtained when parasitic capacitances are taken into account. Moreover, a comparison with a static CMOS implementation shows an acceptable overhead in terms of area and power consumption.
differential power analysis, DPA, power analysis, differential logic, dual rail logic, chip-cards, cryptography

M. Bucci, L. Giancane, R. Luzzi and A. Trifiletti, "A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards," in IEEE Transactions on Dependable and Secure Computing, vol. 4, no. , pp. 245-251, 2007.
83 ms
(Ver 3.3 (11022016))