Publication:
Cryptographic Circuit Design In Nanometer CMOS Technologies

dc.contributor.advisorWayne P. Burleson
dc.contributor.advisorSandip Kundu
dc.contributor.advisorCsaba A. Moritz
dc.contributor.authorLin, Lang
dc.contributor.departmentUniversity of Massachusetts - Amherst
dc.date2023-09-23T09:21:39.000
dc.date.accessioned2024-04-26T14:13:59Z
dc.date.available2014-06-16T00:00:00Z
dc.date.issued2012-02-01
dc.description.abstractAs increasingly important modules in modern embedded systems, cryptographic circuits rely on provable theorems to guarantee hardware security and information privacy. However, perfect security on silicon is very difficult to achieve because traditional implementations of cryptographic circuits are vulnerable to various physical attacks and especially power side-channel analysis attacks. With the rapid advances of complementary metal-oxide-semiconductor (CMOS) technologies reaching nanometer regimes, more security threats on the hardware level occur due to increased data-dependent leakage power, process variations and interconnect couplings. With the trend of separating design from chip fabrication due to economic incentives, untrusted foundry in the semiconductor supply chain can covertly implant "hardware Trojans" to facilitate physical attacks or even devoid the cryptographic circuits. The present and future design of nanometer cryptographic circuits must take the impacts of process technology and business model into account. In this work, we have proposed a new security metric PAT and FPGA validation methodologies to evaluate the side-channel attack resistance of nanometer cryptographic circuits. We have demonstrated that process variations and lightweight hardware Trojans can both degrade the embedded system security. To eliminate the side-channel information leakage, the most effective way is to directly build cryptographic circuits with inherent physical randomness such as in the physical unclonable functions (PUFs). We have developed a statistical design methodology and post-silicon validation platform for sub-45nm PUF circuits, and demonstrated improved PUF security with a low-power design in advanced technology nodes. Our test chips in 45nm CMOS silicon-on-insulator technology have negligible side-channel information leakage and can potentially be integrated into modern low-power secure embedded systems.
dc.description.degreeDoctor of Philosophy (PhD)
dc.description.departmentElectrical and Computer Engineering
dc.identifier.doihttps://doi.org/10.7275/5690900
dc.identifier.urihttps://hdl.handle.net/20.500.14394/13588
dc.relation.urlhttps://scholarworks.umass.edu/cgi/viewcontent.cgi?article=1339&context=dissertations_1&unstamped=1
dc.source.statuspublished
dc.subjectApplied sciences
dc.subjectCryptographic circuit design
dc.subjectNanometer CMOS
dc.subjectEmbedded system security
dc.subjectHardware trojan
dc.subjectLow-power design
dc.subjectPhysical unclonable function
dc.subjectProcess variation
dc.subjectSide-channel analysis
dc.subjectElectrical and Computer Engineering
dc.titleCryptographic Circuit Design In Nanometer CMOS Technologies
dc.typecampus
dc.typearticle
dc.typedissertation
digcom.contributor.authorLin, Lang
digcom.date.embargo2014-06-16T00:00:00-07:00
digcom.identifierdissertations_1/337
digcom.identifier.contextkey5690900
digcom.identifier.submissionpathdissertations_1/337
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Lin_umass_0118D_10935.pdf
Size:
4.02 MB
Format:
Adobe Portable Document Format
Collections