Professional Documents
Culture Documents
A 7T Security Oriented SRAM Bitcell
A 7T Security Oriented SRAM Bitcell
8, AUGUST 2019
Abstract—Power analysis (PA) attacks have become a seri- mostly implemented with the 6T SRAM macrocell, which
ous threat to security systems by enabling secret data extraction provides high density, robust operation, and high performance.
through the analysis of the current consumed by the power sup- However, 6T SRAM arrays are traditionally designed and
ply of the system. Embedded memories, often implemented with optimized for high density and performance, while their
six-transistor static random access memory (SRAM) cells, serve security properties are often overlooked, resulting in a high
as a key component in many of these systems. However, conven-
susceptibility to PA attacks.
tional SRAM cells are prone to side-channel PA attacks due to
the correlation between their current characteristics and written Previous works have proposed modified SRAM bitcells
data. To provide resiliency to these types of attacks, we propose to reduce the correlation between the dynamic power dis-
a security-oriented 7T SRAM cell, which incorporates an addi- sipation and the stored data of a conventional 6T SRAM
tional transistor to the original 6T SRAM implementation and a array [14], [15]. Both of these solutions are based on a two-
two-phase write operation, which significantly reduces the corre- stage write operation. During the first stage, the internal
lation between the stored data and the power consumption during nodes of the SRAM cell (Q and QB) are pre-charged to
write operations. The proposed 7T SRAM cell was implemented a constant voltage to eliminate the correlation between the
in a 28 nm technology and demonstrates over 1000× lower write previously stored data, and the write operation that follows.
energy standard deviation between write “1” and “0” operations Konur et al. [14] suggested performing the pre-charge oper-
compared to a conventional 6T SRAM. In addition, the proposed
ation by using two additional PMOS transistors beyond the
cell has a 39%–53% write energy reduction and a 19%–38%
reduced write delay compared to other PA resistant SRAM cells. original 6T SRAM in order to power-cut the supply during
the additional pre-charge phase. Rožić et al. [15] proposed a
feedback-cut SRAM cell, composed of two additional NMOS
Index Terms—Static random access memory (SRAM), side- devices which are used to cut off the feedback of the SRAM
channel attacks (SCA), differential power analysis (DPA). cell in order to avoid short-circuit power dissipation. While
these solutions effectively reduce the correlation between the
power consumption and stored data of the SRAM array, they
I. I NTRODUCTION
result in significant delay and power overheads, as well as
HE USE of cryptographic devices storing sensitive
T information has grown considerably during the last few
decades and has become a crucial part of many applications,
reduced static noise margins (SNMs).
In general, we assume that a side-channel attacker has
access to the power supply lines of the system, and that he
such as smart cards, and mobile devices [1], [2]. Side channel has knowledge of the chip architecture, including the memory
analysis (SCA) is a powerful threat to these devices because organization, array peripherals and internal timing paths. In
it exploits the information related to the physical behavior addition, it is assumed that the attacker can assign input vectors
of these devices to extract sensitive data [3], [4]. PA attacks to the system, which can result in memory write operations to
are considered to be one of the most powerful types of SCA selected rows. Finally, it is common to assume that the overall
methods since they require relatively simple equipment and current consumed by the memory macro peripherals and other
setups [3], [5]–[10]. PA attacks exploit the correlation between chip components can be treated as algorithmic noise, which
the instantaneous current consumed by the power supply of the can be filtered out using enough current traces [3], [4], espe-
device and its processed and stored data, to extract secret data cially when the memory array is operated under a separate
or sensitive information. supply voltage [16], [17].
Embedded memories dominate the area and power con- In this brief, we describe a novel security-oriented 7T
sumption of many VLSI system-on-chips (SoCs) [11], and SRAM cell design, which incorporates a two-phased write
are key components of many cryptographic systems, such as operation, and significantly reduces the correlation between
smart cards [12] and wireless networks employing cryptogra- the written and stored data in the memory and its power dis-
phy algorithms [13], where they are used to store instruction sipation, thus providing a PA resilient memory. The proposed
code and data. Therefore, the analysis and design of secured 7T cell includes an additional transistor to the original 6T
memories is of utmost importance. Embedded memories are SRAM implementation and a single power gate transistor per
memory word, which are used to equalize the Q and QB volt-
Manuscript received July 23, 2018; revised October 2, 2018 and ages during the first phase of the write operation. Compared
November 21, 2018; accepted December 7, 2018. Date of publication to other PA resistant memory solutions, the proposed cell pro-
December 11, 2018; date of current version July 30, 2019. This brief
was recommended by Associate Editor I.-C. Park. (Corresponding author: vides 39%–53% lower energy dissipation, 19%–38% lower
Robert Giterman.) write delay, and the highest read and hold SNMs compared to
The authors are with the Emerging Nanoscaled Integrated Circuits other PA resilient memory solutions.
and Systems Labs, Faculty of Engineering, Bar-Ilan University, Outline: The rest of this brief is organized as follows.
Ramat Gan 5290002, Israel (e-mail: robert.giterman@biu.ac.il).
Color versions of one or more of the figures in this paper are available
Section II provides a cell-level PA of a conventional 6T
online at http://ieeexplore.ieee.org. SRAM, demonstrating the correlation between its data and
Digital Object Identifier 10.1109/TCSII.2018.2886175 write energy consumption. Section III introduces the proposed
1549-7747 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
GITERMAN et al.: 7T SECURITY ORIENTED SRAM BITCELL 1397
Fig. 5. (a) Current consumed during write ‘1’ and ‘0’ operations to the 7T
cell. (b) Write energy distribution of the proposed 7T SRAM during a write
operation under process variations.
mean energy dissipations for the write ‘0’ and ‘1’ operations
Fig. 4. Waveform illustration of the 7T SRAM write operation. are 2.297 fJ and 2.301 fJ with a standard deviation of 0.0345 fJ
and 0.353 fJ, respectively, thus resulting in a much smaller dif-
ference than similar distributions obtained for the 6T SRAM
to enable write access to the cell. BL and BLB, already set cell.
to VDD and GND, respectively, are then transferred to Q-7T The correlation between the write energy dissipation and
and QB-7T to complete the write ‘1’ operation. For compari- the stored data can be generalized to obtain the overall energy
son, the internal voltages of a conventional 6T cell (Q-6T and consumption of an m-bit word stored in a memory row. For an
QB-6T) are only changed when the WL has been asserted, m-bit word stored in array, the total energy dissipation depends
resulting in a significant energy difference between write ‘1’ linearly on the Hamming weight of the stored data, given by
and ‘0’ operations.
Ewword = Hw · EC + (m − Hw ) · ENC (1)
B. Power Analysis where m is the word length, EC and ENC are the write energy
dissipations when the data stored in the cell is changed or un-
Due to the symmetric structure of the 7T cell, the current
changed, respectively, and Hw is the Hamming weight of the
consumed during the equalization phase is independent of the
word, which equals the Hamming distance between the word
data previously stored in the cell. Moreover, the cell does not
value and the BL voltages, given by
consume additional energy during this phase since VVDD is
cut off and the voltages on Q and QB are equalized through Hw = HD(BL, Q) = (BLi = Qi ) (2)
charge sharing; hence, the power consumption prior to the WL i
assertion is identical when either ‘1’ or ‘0’ were previously
stored in the cell. To evaluate the security of a 32 bit memory word, write
The currents dissipated by the 7T SRAM cell during the simulations of the 32 different Hw values were applied to the
write ‘1’ and ‘0’ operations to a cell previously storing a ‘0’ 7T and 6T SRAM cells, and the standard deviations between
are shown in Fig. 5(a), resulting in almost identical wave- the current traces were computed. This methodology is com-
forms due to the two-phase write operation, thus demonstrating monly used to estimate the magnitude of the information
the lack of current information leakage. The corresponding leakage [15], [18].1 The obtained standard deviation curves
write energy scatter plot of the 7T SRAM cell is shown in 1 Information leakage enables the reduction of the entropy of the memory
Fig. 5(b), as extracted from 1000 MC simulations includ- word, which is defined as the base-2 logarithm of all possible 32-bit data
ing device mismatch and process variations. As expected, the combinations.
GITERMAN et al.: 7T SECURITY ORIENTED SRAM BITCELL 1399
TABLE I
C OMPARISON OF SRAM C ELLS
E. Stability Analysis [3] P. Kocher, J. Jaffe, B. Jun, and P. Rohatgi, “Introduction to differential
power analysis,” J. Cryptograph. Eng., vol. 1, no. 1, pp. 5–27, 2011.
The read and hold SNMs of the SRAM cells were extracted [4] S. Mangard and A. Y. Poschmann, Constructive Side-Channel Analysis
by finding the maximal square that resides inside the “but- and Secure Design. New York, NY, USA: Springer, 2015.
terfly curves”, a metric introduced by Seevinck in [19]. The [5] M. Alioto, L. Giancane, G. Scotti, and A. Trifiletti, “Leakage power
proposed 7T cell achieved 67% and 11% higher read SNM analysis attacks: A novel class of attacks to nanometer cryptographic
circuits,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 57, no. 2,
than the power-cut and feedback-cut SRAM cells, respectively. pp. 355–367, Feb. 2010.
The low read SNM of the power-cut cell is due to the power [6] M. Alioto, S. Bongiovanni, M. Djukanovic, G. Scotti, and A. Trifiletti,
gate devices which are integrated inside the bitcell and limit “Effectiveness of leakage power analysis attacks on DPA-resistant logic
the supply current used to retain the data in the cell. The read styles under process variations,” IEEE Trans. Circuits Syst. I, Reg.
SNM of the feedback-cut cell is limited because Q and QB Papers, vol. 61, no. 2, pp. 429–442, Feb. 2014.
[7] I. Levi, O. Keren, and A. Fish, “Data-dependent delays as a barrier
cannot be charged to their maximal value as a result of the VT against power attacks,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 62,
drop across the feedback-cut NMOS transistors. As expected, no. 8, pp. 2069–2078, Aug. 2015.
the hold SNM of all the considered bitcells was higher than [8] M. Avital, I. Levi, O. Keren, and A. Fish, “CMOS based gates for
their read SNM, with the proposed 7T SRAM achieving the blurring power information,” IEEE Trans. Circuits Syst. I, Reg. Papers,
vol. 63, no. 7, pp. 1033–1042, Jul. 2016.
highest hold SNM among the security oriented bitcells. [9] M. Avital, H. Dagan, I. Levi, O. Keren, and A. Fish, “DPA-secured
quasi-adiabatic logic (SQAL) for low-power passive RFID tags employ-
ing S-boxes,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 62, no. 1,
V. C ONCLUSION pp. 149–156, Jan. 2015.
Embedded memories, implemented with 6T SRAM macros, [10] R. Giterman et al., “Leakage power attack-resilient symmetrical 8T
occupy a large portion of cryptographic systems and may hold SRAM cell,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 26,
no. 10, pp. 2180–2184, Oct. 2018.
secret data; these require special design precautions to provide [11] ITRS. (2015). International Technology Roadmap for Semiconductors—
resiliency to PA attacks. In this brief, we proposed a novel 2015 Edition. [Online]. Available: http://www.itrs2.net
7T SRAM cell composed of an additional PMOS transistor [12] M. Neve, E. Peeters, D. Samyde, and J.-J. Quisquater, “Memories: A
added to the original 6T SRAM implementation, and employ- survey of their secure uses in smart cards,” in Proc. 2nd IEEE Int.
ing a two-phase write operation to significantly reduce the Security Storage Workshop (SISW), 2003, p. 62.
[13] W. Liu, R. Luo, and H. Yang, “Cryptography overhead evaluation and
correlation between the consumed energy and the written data. analysis for wireless sensor networks,” in Proc. WRI Int. Conf. Commun.
The proposed 7T SRAM cell achieves over 1000× decreased Mobile Comput. (CMC), vol. 3, 2009, pp. 496–501.
energy correlation compared to the conventional 6T SRAM. [14] E. Konur et al., “Power analysis resistant SRAM,” in Proc. IEEE World
In addition, using a voltage equalization mechanism during Autom. Congr., 2006, pp. 1–6.
[15] V. Rožić et al., “Design solutions for securing SRAM cell against
the pre-charge phase of the write operation, the proposed 7T power analysis,” in Proc. IEEE Int. Symp. Hardw. Orient. Security Trust
SRAM cell achieves 39%–53% lower energy dissipation and (HOST), 2012, pp. 122–127.
19%–38% lower write delay than other PA resilient SRAM [16] B. Zimmer et al., “SRAM assist techniques for operation in a wide
bitcells. voltage range in 28-nm CMOS,” IEEE Trans. Circuits Syst. II, Exp.
Briefs, vol. 59, no. 12, pp. 853–857, Dec. 2012.
[17] M.-H. Chang, Y.-T. Chiu, and W. Hwang, “Design and iso-area V min
R EFERENCES analysis of 9T subthreshold SRAM with bit-interleaving scheme in
65-nm CMOS,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 59, no. 7,
[1] D. Lim et al., “Extracting secret keys from integrated circuits,” pp. 429–433, Jul. 2012.
IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 10, [18] M. Renauld, D. Kamel, F.-X. Standaert, and D. Flandre, “Information
pp. 1200–1205, Oct. 2005. theoretic and security analysis of a 65-nanometer DDSLL AES S-box,”
[2] D. Genkin, L. Pachmanov, I. Pipman, E. Tromer, and Y. Yarom, in Proc. Int. Workshop Cryptograph. Hardw. Embedded Syst., 2011,
“ECDSA key extraction from mobile devices via nonintrusive physical pp. 223–239.
side channels,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security, [19] E. Seevinck et al., “Static-noise margin analysis of MOS SRAM cells,”
2016, pp. 1626–1638. IEEE J. Solid-State Circuits, vol. SSC-22, no. 5, pp. 748–754, Oct. 1987.