FPGA implementation and analysis of random delay insertion countermeasure against DPA

38Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security devices can reveal critical information about the cryptographic key from the power consumption of their circuits. Differential Power Analysis (DPA) is one of the most effective power analysis techniques. In recent years numerous countermeasures against the DPA attack of hardware implementations of security algorithms have been proposed. In this paper, we investigate the Random Delay Insertion (RDI) countermeasure. Previous research has evaluated RDI for microprocessor implementations; however, its security properties in relation to hardware implementations have not been investigated in detail. We prove both theoretically and practically that it is an effective technique on FPGA devices and we propose a set of critical parameters that can be utilized to optimize a security algorithm design with RDI in terms of area, speed and power. In this work, we implement the first hardware security architecture with RDI on an FPGA device, and attack it using DPA. It is shown that RDI is an efficient countermeasure technique on FPGA in comparison to other countermeasures. © 2008 IEEE.

Cite

CITATION STYLE

APA

Lu, Y., O’Neill, M. P., & McCanny, J. V. (2008). FPGA implementation and analysis of random delay insertion countermeasure against DPA. In Proceedings of the 2008 International Conference on Field-Programmable Technology, ICFPT 2008 (pp. 201–208). https://doi.org/10.1109/FPT.2008.4762384

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free