Cryptology ePrint Archive: Report 2015/974
The Conjoined Microprocessor
Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
Abstract: Over the last twenty years, the research community has devised sophisticated methods for retrieving secret information from sidechannel emanations, and for resisting such attacks. This paper introduces a new CPU architecture called the Conjoined Microprocessor. The Conjoined Microprocessor can randomly interleave the execution of two programs at very low extra hardware cost. We developed for the Conjoined Microprocessor a preprocessor tool that turns a target algorithm into two (or more) separate queues like $Q_0$ and $Q_1$ that can run in alternation. $Q_0$ and $Q_1$ fulfill the same operation as the original target algorithm. Power-analysis resistance is achieved by randomly alternating the execution of $Q_0$ and $Q_1$, with different runs resulting in different interleavings. Experiments reveal that this architecture is indeed effective against CPA.
Category / Keywords: implementation / side channel attacks
Date: received 7 Oct 2015, last revised 9 Oct 2015
Contact author: david naccache at ens fr
Available format(s): PDF | BibTeX Citation
Version: 20151011:025352 (All versions of this report)
Short URL: ia.cr/2015/974
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]