Professional Documents
Culture Documents
Finsal: Finfet-Based Secure Adiabatic Logic For Energy-Efficient and Dpa Resistant Iot Devices
Finsal: Finfet-Based Secure Adiabatic Logic For Energy-Efficient and Dpa Resistant Iot Devices
Finsal: Finfet-Based Secure Adiabatic Logic For Energy-Efficient and Dpa Resistant Iot Devices
1, JANUARY 2018
Abstract—With the emergence of Internet of Things (IoT), devices can be obtained through the side-channel attacks [6].
there is an urgent need to design energy-efficient and secure IoT Among the various side-channel attacks reported in the liter-
devices. For example, IoT devices such as radio frequency identi- ature, differential power analysis (DPA) attack is considered
fication tags and wireless sensor nodes employ AES cryptographic
module that are susceptible to differential power analysis (DPA) to be one of the powerful side-channel attacks to reveal the
attacks. With the scaling of technology, leakage power in the secret information from the secure devices [7]. Various hard-
cryptographic device increases, which increases their vulnera- ware related DPA countermeasures have been developed over
bility to DPA attack. This paper presents a novel FinFET-based the years [8]. But none of these countermeasures are suitable
secure adiabatic logic (FinSAL), that is energy-efficient and DPA- to implement in devices where there is a constraint on power
immune. The proposed adiabatic FinSAL is used to design logic
gates such as buffers, XOR, and NAND. Further, the logic gates consumption [8].
based on adiabatic FinSAL are used to implement a positive Adiabatic logic [10] is one of the circuit design techniques
polarity Reed Muller architecture-based S-box circuit. SPICE to design energy-efficient and secure hardware. A survey on
simulations at 12.5 MHz show that adiabatic FinSAL (20-nm DPA countermeasures has concluded that adiabatic logic is
FinFET technology) S-box circuit saves up to 81% of energy one of the promising techniques to design low-power (LP)
per cycle as compared to the conventional S-box circuit imple-
mented using FinFET (20-nm FinFET technology). Further, the and secure hardware [8]. Further, the usefulness of adiabatic
security of adiabatic FinSAL S-box circuit has been evaluated logic circuits for LP and DPA resistant IoT devices is also
by performing the DPA attack through SPICE simulations. We established in a recent research article on [12].
proved that the FinSAL S-box circuit is resistant to a DPA attack There are very few contributions that have explored the
through a developed DPA attack flow applicable to SPICE sim- utility of adiabatic logic family as a DPA countermeasure
ulations. Further, the impact of FinSAL on hardware security at
different technology nodes of FinFETs (7, 10, 14, and 16 nm) are (Table I). However, the existing DPA-resistant adiabatic logic
evaluated. From the simulation results, FinSAL gates at 14-nm families have some drawbacks as illustrated in Table I. Among
FinFET offer superior security with optimum power consump- various logic families listed in Table I, symmetric pass gate
tion, therefore is the best candidate to design low-power secure adiabatic logic (SPGAL) consumes LP and is more secure than
IoT devices. the existing DPA-resistant adiabatic logic families. These prop-
Index Terms—Adiabatic logic, differential power analy- erties make it suitable to implement in IoT-based devices [1].
sis (DPA), FinFETs, hardware security, Internet of Things (IoT) However, at lower technology nodes, SPGAL has relatively
device, low-power (LP). high leakage power as compared to existing DPA-resistant
adiabatic logic families.
I. I NTRODUCTION Scaling of the device technology leads to the increase
in the leakage current [17]. Increase in the leakage current
HE QUALITY of life of individuals and societies would
T improve with the emergence of Internet of Things
(IoT). IoT has widespread applications in the field of
reduces the energy-efficiency of the computing circuits [18],
and increases their vulnerability to DPA attack [19]. Hence,
it is important to investigate the crypto circuits in low leak-
manufacturing, automotive, medical, communication, finance, age devices such as FinFET to make them ultra-LP and DPA
etc. [3]. IoT-based devices such as radio frequency identifi- resistant.
cation (RFID) tags and wireless sensor nodes (WSNs) are
used to store and communicate the secret or personal data
over the Internet [4], [5]. However, the secret or personal A. Motivation
information stored and communicated through these IoT-based With the emergence of IoT, there is an urgent need to
design LP and secure IoT devices. Improvement in the secu-
Manuscript received September 14, 2016; revised December 29, 2016;
accepted February 26, 2017. Date of publication March 21, 2017; date of rity of these devices comes at the cost of reduction in battery
current version December 20, 2017. A preliminary version of this paper has life. Battery life is considered as an important parameter in
been published in ISVLSI 2016 [1] and ICRC 2016 [2]. This paper was the design of self-powered IoT devices. Adiabatic logic is
recommended by Associate Editor S. Mohanty.
The authors are with the Department of Electrical and Computer considered to be an alternate way to design LP and DPA-
Engineering, University of Kentucky, Lexington, KY 40506 USA (e-mail: resistant hardware. One of the main feature of adiabatic logic
hthapliyal@uky.edu). is that it can operate efficiently at a frequency less than
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. 1 GHz. Thus, adiabatic logic can be used to design LP and
Digital Object Identifier 10.1109/TCAD.2017.2685588 secure IoT-based devices which operate at low frequencies.
0278-0070 c 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: FINSAL FOR ENERGY-EFFICIENT AND DPA RESISTANT IoT DEVICES 111
TABLE I
D RAWBACKS OF E XISTING DPA R ESISTANT A DIABATIC L OGIC FAMILIES
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
112 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 37, NO. 1, JANUARY 2018
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: FINSAL FOR ENERGY-EFFICIENT AND DPA RESISTANT IoT DEVICES 113
(a) (b)
Fig. 3. (a) Schematic of FinSAL buffer. (b) Timing diagram for FinSAL buffer.
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
114 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 37, NO. 1, JANUARY 2018
TABLE II
20−NM F IN FET D EVICE PARAMETERS
TABLE III
S IMULATED AND C ALCULATED R ESULTS FOR DPA-R ESISTANT
A DIABATIC L OGIC -BASED XOR G ATE
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: FINSAL FOR ENERGY-EFFICIENT AND DPA RESISTANT IoT DEVICES 115
TABLE IV TABLE V
S IMULATED AND C ALCULATED R ESULTS FOR DPA-R ESISTANT S IMULATED AND C ALCULATED R ESULTS FOR BALANCED
A DIABATIC L OGIC -BASED AND G ATE AND U NBALANCED F IN SAL AND G ATE
TABLE VI
S IMULATED AND C ALCULATED R ESULTS FOR BALANCED
AND U NBALANCED F IN SAL XOR G ATE
quasi-adiabatic logic (SQAL) [9]. From Tables III and IV, it
can be inferred that FinSAL-based XOR and AND gate have
very negligible energy deviation for various input transitions.
This property of FinSAL gates make it suitable to build DPA
resistant hardware.
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
116 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 37, NO. 1, JANUARY 2018
TABLE VIII
C OMPARISON R ESULTS OF F IN SAL AND G ATE AT D IFFERENT F IN FET
T ECHNOLOGY N ODES (BALANCED L OAD C APACITANCES )
Fig. 10. NED values as a function of number of fins in FinSAL XOR gate.
TABLE VII
E FFECT OF C LOCK J ITTER AND C LOCK D ELAY TABLE IX
W ITH THE S ECURITY OF F IN SAL XOR G ATE C OMPARISON R ESULTS OF F IN SAL AND G ATE AT D IFFERENT F IN FET
T ECHNOLOGY N ODES (U NBALANCED L OAD C APACITANCES )
TABLE X
C. Effect of Clock on Security of FinSAL Logic C OMPARISON R ESULTS OF F IN SAL XOR G ATE AT D IFFERENT F IN FET
In FinSAL logic, four phase clocks are used to recover T ECHNOLOGY N ODES (BALANCED L OAD C APACITANCES )
the energy from the load capacitors. However, delay in the
clocks may lead to glitches which can affect the security of
the FinSAL logic. As an example, we have performed the
clock delay-based simulations on a FinSAL XOR gate. Four
FinSAL XOR gates are connected in series and the four phase
clocks are applied with clock jitter and the second clock is
delayed by 40 ns. Table VII shows the NED and NSD values
TABLE XI
of FinSAL XOR gate with jitter and clock delay. As expected, C OMPARISON R ESULTS OF F IN SAL XOR G ATE AT D IFFERENT F IN FET
FinSAL XOR logic with clock jitter consume high power as T ECHNOLOGY N ODES (U NBALANCED L OAD C APACITANCES )
compared to synchronized clock. However, FinSAL logic with
jitter and clock delay has similar energy deviations compared
to FinSAL logic without jitter. This shows that clock delay
and clock jitter has minimum effect on security of FinSAL
logic.
TABLE XII
VI. E VALUATION OF F IN SAL L OGIC G ATES F IN FET D EVICE PARAMETERS FOR D IFFERENT T ECHNOLOGY N ODES
AT L OWER T ECHNOLOGY F IN FET N ODES
It has been already shown in Tables III and IV that
FinSAL-based logic gates are more energy-efficient and secure
against DPA attacks as compared to the existing adiabatic
logic-based DPA countermeasure circuits. The main moti-
vation of this section is to analyze the security offered
by the FinSAL gates at lower FinFET technology nodes.
With the lowering of FinFET technology, Vdd is reduced.
Reduction of power supply reduces the dynamic energy con- A. FinSAL Logic Gates at 16-nm Technology FinFET Nodes
sumption. However, energy deviation of FinSAL gates at Table XII shows the FinFET parameters which are used for
lower technology nodes can be found out by simulation-based the simulation of the FinSAL logic gates at lower technology
experiments. nodes.
Security evaluation of the FinSAL logic gates are investi- Tables VIII and X show the comparison results of the
gated at 16-, 14-, 10-, and 7-nm FinFET technology nodes. As FinSAL AND and FinSAL XOR gate at different technol-
discussed earlier, NED and NSD values are considered as the ogy nodes with the balanced load capacitances, respectively.
security evaluation metrics for the logic gates. In order to con- From Tables VIII and X, it can be inferred that 16-nm FinSAL
sider the effect of routing issues and manufacturing defects, AND and FinSAL XOR gate with balanced load capacitances
we have evaluated all the FinSAL logic gates with the bal- (0.8 fF) consume 6% and 7% less energy as compared to the
anced and unbalanced load capacitances. The unbalanced load 20-nm FinSAL AND and XOR gate. Tables VIII and X also
capacitances are simulated with the tolerance of 50%. show that 16-nm FinSAL AND and XOR gate offer more
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: FINSAL FOR ENERGY-EFFICIENT AND DPA RESISTANT IoT DEVICES 117
resistant to DPA attacks with reduced NED and NSD val- FinSAL AND gate and consumes less energy as compared
ues. Tables IX and XI show the comparison results of the other FinSAL AND gate.
FinSAL AND and XOR gate at different technology nodes From Table XI, it can be inferred that 7-nm FinSAL
with the unbalanced load capacitances. From the simulation XOR gate saves up to 1% of energy as compared to the
and calculated results, we have observed that 20-nm FinSAL FinSAL 10-nm XOR gate. 7-nm FinSAL XOR gate has almost
AND gate with unbalanced load capacitances offers similar same energy consumption and offers same security as 14-nm
security as compared to 16-nm FinSAL AND gate. Moreover, FinSAL XOR gate. However, with the unbalanced load capac-
with FinSAL XOR gate, we have observed that 20-nm FinSAL itances, 14-nm FinSAL XOR gate offers superior security as
XOR gate offer more security than 16-nm FinSAL XOR gate. compared to 7-nm FinSAL XOR gate (Table XI).
B. FinSAL Logic Gates at 14-nm Technology FinFET Nodes VII. L EAKAGE P OWER A NALYSIS
OF F IN SAL L OGIC G ATES
From Tables VIII and X, it can be inferred that 14-nm
FinSAL AND and XOR gate with balanced load capacitances With the scaling of technology (sub-100 nm), leakage power
(0.7 fF) consume 1% and 3% less energy as compared to the is known to be comparable to the dynamic power and is
16-nm FinSAL gates. Though there is not significant improve- expected to become larger [26]. For IoT-based devices, minia-
ment in energy consumption, 14-nm FinSAL AND and XOR turization is also an important aspect in the design along with
gate offers significant improvement in the security of the secu- the security and the battery power. Miniaturization is done by
rity gates with NED value less than 0.01%. Very minimum scaling the device. In a recent article on effectiveness of leak-
NED and NSD values of 14-nm FinSAL AND and XOR gate age power analysis attacks on DPA-resistant logic styles by
makes it more secure as compared to the other technology Alioto et al. [19] it has been proved that the existing DPA-
FinSAL AND gate. However, 14-nm FinSAL AND gate with resistant logic styles are unsecured, which means the leakage
unbalanced load capacitance (Table IX) offer similar security power can be used to reveal the secret keys.
compared to other FinSAL AND gates. But, 14-nm FinSAL FinFET is considered as a low-leakage emerging transistor
XOR gate offers superior security as compared to other tech- which have very low leakage power compared to MOSFET
nology FinSAL XOR gate with unbalanced load capacitances due to the double gate control over the channel. In this sec-
(Table XI). tion, we are analyzing the reduction of leakage power in the
adiabatic logic-based FinSAL gates implemented at different
FinFET technology nodes. In this paper, leakage power is
C. FinSAL Logic Gates at 10-nm Technology FinFET Nodes
calculated during the hold phase of the clock.
From Tables VIII and X, it can be inferred that 10-nm
FinSAL AND gate and FinSAL XOR gate with balanced load A. Leakage Power Analysis of DPA Resistant AND Gate
capacitances (0.6 fF) consume 2% and 1% less energy as com-
pared to the 14-nm FinSAL AND and XOR gates. Though Table XIII provides the leakage power of various DPA resis-
10-nm FinSAL AND gate has reduced energy consumption tant adiabatic logic families for a two-input AND gate. We
as compared to the 14-nm FinSAL AND gate, it can be seen have calculated the leakage power of MOSFET device-based
from Table VIII that 10-nm FinSAL AND gate have higher DPA-resistant adiabatic logic families at 45-nm technology.
NED values than 14-nm FinSAL AND gate. Higher NED val- We have calculated leakage power at 45-nm of MOSFET
ues results in reduction in security of the 10-nm FinSAL AND device because 45-nm MOSFETs have significant leakage
gate than 14-nm FinSAL AND gate. 10-nm FinSAL XOR gate power as compared to 180-nm MOSFET device [27].
has almost same energy consumption and offers same security From Table XIII, it is shown that MOSFET device-based
as 14-nm FinSAL XOR gate. However, with the unbalanced gates have higher leakage power as compared to the FinFET-
load capacitances, 14-nm FinSAL XOR gate offers superior based gates. MOSFET devices have higher leakage power at
security as compared to 10-nm FinSAL XOR gate (Table XI). lower technology nodes due to the formation of the leakage
current in the short channel of the devices. However, leak-
age currents in the FinFETs can be reduced by the control
D. FinSAL Logic Gates at 7-nm Technology of double gates. In DPA-resistant adiabatic logic families in
FinFET Nodes Table XIII, SPGAL has high leakage power. Though SPGAL
With the lower technology nodes, Vdd is reduced which have low dynamic power, it suffers from high leakage power
results in the reduction of the energy consumption. From due to the pull down configuration of transistors. It is clearly
Table VIII, it can be seen that 7-nm FinSAL AND gate con- shown from the Table XIII that FinSAL AND gates reduces
sumes less energy as compared to all other FinSAL technology leakage power dissipation as compared to the MOSFET-based
nodes. It is also shown that 7-nm FinSAL AND gate with bal- DPA-resistant adiabatic logic families.
anced capacitances (0.6 fF) offer superior security as compared 14-nm FinSAL AND gate has very low leakage power as
to 20-, 16-, and 10-nm FinSAL logic gates. From our simula- shown in Table XIII. 14-nm FinSAL AND gate has 80.1% of
tion results, we conclude that 14-nm FinSAL AND gate offer reduction of leakage current as compared to CSSAL AND
superior security as compared to all other FinSAL AND gate gate. 14-nm FinSAL AND gate has also reduced leakage
with balanced gates. However, 7-nm FinSAL AND gate with power as compared to other DPA-resistant adiabatic logic fam-
unbalanced load capacitances offer similar security as 14-nm ilies. For example, 14-nm FinSAL AND has 72.45% and
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
118 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 37, NO. 1, JANUARY 2018
TABLE XIII
L EAKAGE P OWER OF VARIOUS DPA R ESISTANT A DIABATIC L OGIC FAMILIES AT D IFFERENT
T ECHNOLOGY FOR A LL P OSSIBLE I NPUTS FOR A T WO -I NPUT AND G ATE
TABLE XIV
L EAKAGE P OWER OF VARIOUS DPA R ESISTANT A DIABATIC L OGIC FAMILIES AT D IFFERENT
T ECHNOLOGY FOR A LL P OSSIBLE I NPUTS FOR A T WO -I NPUT XOR G ATE
84.03% reduction of leakage power as compared to SQAL architecture-based S-box circuit [28] using FinSAL gates and
and SPGAL AND gate. 14-nm FinSAL AND gate has 11.9%, performed DPA attack on it.
7.7%, 12.8%, and 13.9% reductions of leakage power as com-
pared to the FinSAL AND gate implemented in 20-, 16-, 10-, A. Background on DPA Attack on 8-Bit S-Box Circuit
and 7-nm FinFET technologies, respectively.
This section discusses the DPA-attack performed on the
S-box circuit in Cadence Virtuoso. The S-box circuit is
B. Leakage Power Analysis of DPA Resistant XOR Gate designed and simulated in Cadence Virtuoso. Post process-
Table XIV shows the leakage power of the DPA resistant ing of the current traces to extract the keys are done using
XOR gate simulated at 12.5 MHz. Similar to the DPA- MATLAB and Python script. The following steps are followed
resistant AND gate, MOSFET-based DPA-resistant XOR gate to perform the DPA attack on the S-box circuit (Fig. 11) [29].
have higher leakage power than the FinFET-based gates. As 1) A set of plain text I is XORed with a set of hypothet-
expected FinSAL-based XOR gate shows reduced leakage ical keys K. The resultant value is passed to the S-box
power consumption as compared to the other DPA-resistant circuit. A set of expected outputs O (cipher texts) from
adiabatic logic families. Similar to FinSAL AND gate, 14-nm the S-box circuit is retrieved.
FinSAL XOR gate has lower leakage power consumption. 2) The power consumption of the different runs of the plain
14-nm FinSAL XOR gate has 85.8%, 83.8%, and 87% of text are recorded. The known current trace values are
reduction of leakage current as compared to CSSAL, SQAL, written as a vector i = (i1 , i2 , . . . , id ), where in denotes
and SPGAL XOR gate, respectively. 14-nm FinSAL XOR gate the current trace value of the nth input plain text. During
has also reduced leakage power consumption as compared to each run of the input plain text, current traces are col-
FinSAL XOR gate implemented in other FinFET node tech- lected and sampled. The sampled current trace values
nologies. As shown in Table XIV, 14-nm FinSAL XOR gate that corresponds to a particular input plain text is given
has 21.8%, 13.36%, 7.3%, and 11.3% of reduction of leakage as ti = (ti,1 , ti,2 , . . . , ti,T ), where T denotes the length
power as compared to the FinSAL XOR gate implemented in of the trace.
20-, 16-, 10-, and 7-nm FinFET technologies, respectively. 3) In the next step of the DPA attack, the hypotheti-
cal power consumption model using Hamming distance
model is created. This model is represented by the H
VIII. E NERGY-E FFICIENCY AND S ECURITY E VALUATION matrix.
OF THE F IN SAL-BASED S-B OX C IRCUIT 4) In the last step of the DPA attack, each column of the H
In order to evaluate the security of the proposed FinSAL matrix is compared with each column of the M matrix,
logic, we have implemented a positive polarity Reed Muller i.e., the hypothetical power consumption values for all
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: FINSAL FOR ENERGY-EFFICIENT AND DPA RESISTANT IoT DEVICES 119
the keys are compared with recorded traces at different C. Analysis of FinSAL-Based S-Box Circuit
instances of time. This will result in an another matrix
R which is of size K ×T. Each element of R matrix (ri,j ) In this section, analysis of the FinSAL-based S-box circuit
contains the comparison result between the columns of is done. Since the FinSAL-based gates are proposed for build-
hi and mj ing DPA-resistant hardware in IoT-based devices, security and
D energy efficiency becomes the major criteria of evaluation. The
d=1 hd,i − hi . md,j − mj proposed FinSAL logic uses four phase trapezoidal clocks to
ri,j = 2 (2)
D 2 D recover the charge stored in the load capacitors. Since we are
d=1 hd,i − hi . d=1 md,j − mj targeting to implement DPA-resistant hardware in IoT-based
devices, we are making sure to use a minimum number of
where hi and mj denotes the average values of the
voltage sources as compared to the existing DPA-resistant
columns hi and mj . The attacker looks for the maxi-
adiabatic logic families. The total number of FinFETs used
mal value for the entry in the R matrix. If the DPA
to implement the FinSAL and conventional S-box circuit
attack is successful, the correct key can be identified by
are 3624 and 2202, respectively. From our simulations, we
the maximal value that appears in a row (key) of the R
found that the FinSAL S-box circuit works up to 800 MHz.
matrix.
However, from our simulations, we found that FinSAL
S-box circuit is energy-efficient than its CMOS counterpart
B. Test Case for FinSAL-Based S-Box Circuit up to 400 MHz.
In our test case, the key was chosen to be (181)10 . A DPA 1) Security Analysis of FinSAL S-Box Circuit: The immu-
attack was performed on FinSAL-based S-box circuit and nity of the FinSAL logic against DPA attack is validated by
FinFET-based conventional S-box circuit. It was found that the calculating the SNR. SNR is defined as the ratio between
DPA attack was successful on the FinFET-based conventional the correlation value of the correct key and the second max-
S-box circuit with 512 random plain texts whereas the DPA imal value of the wrong key guess [31]. Low SNR values
attack performed on FinSAL-based S-box circuit was unsuc- show the difficulty in distinguishing the correct key and the
cessful. Fig. 12 shows the correlation co-efficient values of the wrong key. For the FinSAL-based S-box circuit, the wrong
hypothetical key guesses for the successful DPA attack in a key guess (key = 231) has the maximum correlation close to
conventional S-box circuit. It can be seen that the correlation 4.35 × 10−4 and was slightly higher than the second maxi-
co-efficient value is peak for key guess = 181. The correlation mal correlation 4.25 × 10−4 leading to SNR value of 1.023,
co-efficient value for the correct key is 0.78. Fig. 13 shows the which is close to unity. For the FinFET implementation of
nonsuccessful DPA attack performed on the 8-bit S-box circuit conventional CMOS-based circuit, for the correct key guess,
implemented using FinSAL gates. The correlation co-efficient the correlation value was 0.8 and was much higher than the
value is maximum for key guess = 231. The correlation second maximal value 0.42 leading to SNR value of 1.904.
co-efficient of the hidden correct key (key = 181) is 1.6×10−4 . SNR value of FinSAL S-box circuit close to unity shows that
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
120 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 37, NO. 1, JANUARY 2018
TABLE XV
C OMPARISON R ESULTS OF S-B OX C IRCUIT I MPLEMENTED W ITH D IFFERENT A DIABATIC L OGIC FAMILY AT 12.5 MH Z
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: FINSAL FOR ENERGY-EFFICIENT AND DPA RESISTANT IoT DEVICES 121
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.
122 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 37, NO. 1, JANUARY 2018
R EFERENCES [24] Y. Ye and K. Roy, “QSERL: Quasi-static energy recovery logic,” IEEE
J. Solid-State Circuits, vol. 36, no. 2, pp. 239–248, Feb. 2001.
[1] S. D. Kumar, H. Thapliyal, A. Mohammad, V. Singh, and [25] M. Bucci, L. Giancane, R. Luzzi, and A. Trifiletti, “Three-phase dual-
K. S. Perumalla, “Energy-efficient and secure S-box circuit using sym- rail pre-charge logic,” in Proc. Int. Workshop Cryptographic Hardw.
metric pass gate adiabatic logic,” in Proc. IEEE Comput. Soc. Annu. Embedded Syst., Yokohama, Japan, 2006, pp. 232–241.
Symp. VLSI (ISVLSI), Pittsburgh, PA, USA, 2016, pp. 308–313. [26] (2008). International Technology Roadmap for Semiconductors (ITRS).
[2] S. D. Kumar, H. Thapliyal, and A. Mohammad, “FinSAL: A novel [Online]. Available: http://www.itrs2.net/
FinFET based secure adiabatic logic for energy-efficient and DPA [27] B. G. Streetman and S. Banerjee, Solid State Electronic Devices, vol. 4.
resistant IoT devices,” in Proc. IEEE Int. Conf. Rebooting Comput., Upper Saddle River, NJ, USA: Prentice-Hall, 2000.
San Diego, CA, USA, 2016, pp. 1–8. [28] S. Morioka and A. Satoh, “An optimized S-box circuit architec-
[3] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things ture for low power AES design,” in Cryptographic Hardware and
(IoT): A vision, architectural elements, and future directions,” Future Embedded Systems-CHES 2002. Heidelberg, Germany: Springer, 2002,
Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013. pp. 172–186.
[4] E. Ilie-Zudor, Z. Kemény, F. van Blommestein, L. Monostori, and [29] J. Wu, Y. Shi, and M. Choi, “Measurement and evaluation of power
A. van der Meulen, “A survey of applications and requirements of unique analysis attacks on asynchronous S-box,” IEEE Trans. Instrum. Meas.,
identification systems and RFID techniques,” Comput. Ind., vol. 62, vol. 61, no. 10, pp. 2765–2775, Oct. 2012.
no. 3, pp. 227–252, 2011. [30] C. Monteiro, Y. Takahashi, and T. Sekine, “Low-power secure S-box
[5] W. Cheng, S. Wang, and X. Cheng, “Virtual track: Applications and circuit using charge-sharing symmetric adiabatic logic for advanced
challenges of the RFID system on roads,” IEEE Netw., vol. 28, no. 1, encryption standard hardware design,” IET Circuits Dev. Syst., vol. 9,
pp. 42–47, Jan./Feb. 2014. no. 5, pp. 362–369, Sep. 2015.
[6] D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and [31] T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining smart-
challenges in technology and standardization,” Wireless Pers. Commun., card security under the threat of power analysis attacks,” IEEE Trans.
vol. 58, no. 1, pp. 49–69, 2011. Comput., vol. 51, no. 5, pp. 541–552, May 2002.
[7] P. Kocher, J. Jaffe, B. Jun, and P. Rohatgi, “Introduction to differential
power analysis,” J. Cryptographic Eng., vol. 1, no. 1, pp. 5–27, 2011.
[8] A. Moradi and A. Poschmann, “Lightweight cryptography and DPA
countermeasures: A survey,” in Financial Cryptography and Data
Security. Heidelberg, Germany: Springer, 2010, pp. 68–79.
[9] M. Avital, H. Dagan, I. Levi, O. Keren, and A. Fish, “DPA-secured S. Dinesh Kumar (S’15) received the B.E. degree
quasi-adiabatic logic (SQAL) for low-power passive RFID tags employ- in electronics and communication engineering from
ing S-boxes,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 62, no. 1, Anna University, Chennai, India, in 2013, and the
pp. 149–156, Jan. 2015. M.S. degree in electronic systems from the Indian
[10] W. C. Athas, L. J. Svensson, J. G. Koller, N. Tzartzanis, and Institute of Information Technology, Design and
E. Y.-C. Chou, “Low-power digital systems based on adiabatic-switching Manufacturing Kancheepuram, Kanchipuram, India,
principles,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 2, in 2015. He is currently pursuing the Ph.D. degree
no. 4, pp. 398–407, Dec. 1994. in electrical engineering with the University of
[11] S. D. Kumar and H. Thapliyal, “QUALPUF: A novel quasi-adiabatic Kentucky, Lexington, KY, USA.
logic based physical unclonable function,” in Proc. 11th Annu. Cyber His current research interests include emerging
Inf. Security Res. Conf., Oak Ridge, TN, USA, 2016, p. 24. nanotechnologies and low-power hardware security
[12] M. Wolf, “Ultralow power and the new era of not-so-VLSI,” IEEE Des. for Internet of Things devices.
Test., vol. 33, no. 4, pp. 109–113, Aug. 2016. Mr. Kumar was a recipient of the Upsilon Pi Epsilon Award for academic
[13] M. Khatir and A. Moradi, “Secure adiabatic logic: A low-energy DPA- achievement in computing discipline by the IEEE Computer Society in 2015.
resistant logic style,” IACR Eprint archive, Tech. Rep. 2008/123, 2008.
[Online]. Available: http://eprint.iacr.org/2008/123
[14] B.-D. Choi, K. E. Kim, K.-S. Chung, and D. K. Kim, “Symmetric adia-
batic logic circuits against differential power analysis,” ETRI J., vol. 32,
no. 1, pp. 166–168, 2010. Himanshu Thapliyal (SM’16) received the Ph.D.
[15] C. Monteiro, Y. Takahashi, and T. Sekine, “Charge-sharing symmetric degree in computer science and engineering from
adiabatic logic in countermeasure against power analysis attacks at cell the University of South Florida, Tampa, FL, USA,
level,” Microelectron. J., vol. 44, no. 6, pp. 496–503, 2013. in 2011.
[16] S. Lu, Z. Zhang, and M. Papaefthymiou, “1.32GHz high-throughput From 2012 to 2014, he was a Designer
charge-recovery AES core with resistance to DPA attacks,” in of Processor Test Solutions with Qualcomm,
Proc. Symp. VLSI Circuits (VLSI Circuits), Kyoto, Japan, 2015, San Diego, CA, USA. He is an Assistant Professor
pp. C246–C247. with the Department of Electrical and Computer
[17] K. Roy, S. Mukhopadhyay, and H. Mahmoodi-Meimand, “Leakage Engineering, University of Kentucky, Lexington,
current mechanisms and leakage reduction techniques in deep- KY, USA. His current research interests include
submicrometer CMOS circuits,” Proc. IEEE, vol. 91, no. 2, pp. 305–327, emerging nanotechnologies, low-power hardware
Feb. 2003. security of Internet of Things devices, and smart health.
[18] S. Mukhopadhyay, A. Raychowdhury, and K. Roy, “Accurate estima- Dr. Thapliyal was a recipient of the Best Ph.D. Dissertation Award at
tion of total leakage in nanometer-scale bulk CMOS circuits based the 2012 IEEE Computer Society Annual Symposium on VLSI, and the
on device geometry and doping profile,” IEEE Trans. Comput.-Aided Qualcomm QualStar Award for contributions to memory built-in self-tests.
Design Integr. Circuits Syst., vol. 24, no. 3, pp. 363–381, Mar. 2005.
[19] M. Alioto, S. Bongiovanni, M. Djukanovic, G. Scotti, and A. Trifiletti,
“Effectiveness of leakage power analysis attacks on DPA-resistant logic
styles under process variations,” IEEE Trans. Circuits Syst. I, Reg.
Papers, vol. 61, no. 2, pp. 429–442, Feb. 2014.
[20] D. Hisamoto et al., “FinFET-a self-aligned double-gate MOSFET scal- Azhar Mohammad received the B.Tech. degree
able to 20 nm,” IEEE Trans. Electron Devices, vol. 47, no. 12, in electronics and communication engineering
pp. 2320–2325, Dec. 2000. from Jawaharlal Nehru Technological University at
[21] D. Dressen, “Considerations for RFID technology selection,” Atmel Hyderabad, Hyderabad, India. He is currently pursu-
Appl. J., vol. 3, pp. 45–47, 2004. ing the master’s degree in electrical engineering with
[22] J. Lim, D.-G. Kim, and S.-I. Chae, “Reversible energy recovery logic the University of Kentucky, Lexington, KY, USA.
circuits and its 8-phase clocked power generator for ultra-low-power His current research interests include very large-
applications,” IEICE Trans. Electron., vol. 82, no. 4, pp. 646–653, 1999. scale integration design, hardware security, and
[23] P. Teichmann, Adiabatic Logic: Future Trend and System Level cryptography.
Perspective, vol. 34. Dordrecht, The Netherlands: Springer, 2011.
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on September 07,2020 at 19:50:42 UTC from IEEE Xplore. Restrictions apply.