Cryptology ePrint Archive: Report 2004/346

Random Switching Logic: A Countermeasure against DPA based on Transition Probability

Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa

Abstract: In this paper, we propose a new model for directly evaluating DPA leakage from logic information in CMOS circuits.This model is based on the transition probability for each gate, and is naturally applicable to various actual devices for simulating power analysis. We also report on our study of the effects of the previously known countermeasures on both our model and FPGA, and show the possibility of leaking information, which is caused by strict precondition for implementing a secure circuit. Furthermore, we present an efficient countermeasure, \textit{Random Switching Logic}(RSL), for relaxing the precondition, and show that RSL makes a cryptographic circuit secure through evaluation on both our model and FPGA.

Category / Keywords: implementation / side-channel attaks, CMOS, leakage model, transition probability

Date: received 3 Dec 2004

Contact author: dice at iss isl melco co jp

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20041213:194340 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]