Skip to Main content Skip to Navigation
Book sections

Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks

Abstract : Cryptographic cores are used to protect various devices but their physical implementation can be compromised by observing dynamic circuit emanations in order to derive information about the secrets it conceals. Protection against these attacks, also called side channel attacks are major concern of the cryptographic community. Masking and dualrail precharge logic are promoted as its countermeasures but each has its own vulnerabilities. In this article, we propose a simple countermeasure which comprises unrolling rounds of a cryptographic algorithm such that multiple rounds are executed per clock cycle. This will require a stronger hypothesis on multiple bits due to deeper diffusion of the key. Results show that it resist against correlation power analysis on Hamming distance and Hamming weight model if the datapath is cleared after each operation. We also evaluated mutual information metric on the design and results show that unrolled DES is less vulnerable.
Document type :
Book sections
Complete list of metadata
Contributor : Sylvain Guilley Connect in order to contact the contributor
Submitted on : Thursday, September 1, 2022 - 12:30:49 AM
Last modification on : Wednesday, September 7, 2022 - 3:04:25 AM


Files produced by the author(s)




Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger. Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks. Josef Pieprzyk. Topics in Cryptology - CT-RSA 2010. The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, 5985, Springer Berlin Heidelberg, pp.195-207, 2010, Lecture Notes in Computer Science, 978-3-642-11924-8. ⟨10.1007/978-3-642-11925-5_14⟩. ⟨hal-03766332⟩



Record views


Files downloads