Hardware based security vulnerabilities such as side-channel attacks, IC piracy, IC counterfeiting, etc. are major threats for the successful deployment of the embedded computing systems. Further, the embedded computing devices work on a limited power supply (battery operated devices), and therefore have stringent constraints on power consumption. In this paper, we propose Energy Recovery (ER) computing as a novel platform to design low-power hardware security primitives for embedded computing devices. As a case study, we have discussed the design of two important ER-based hardware security primitives: (i) low-power and Differential Power Analysis (DPA) resistant PRESENT cryptographic core, (ii) low-power Physically Unclonable Function (PUF). Through simulations, it is illustrated that the ER computing based hardware security primitives are low-power as compared to the existing approaches. For example, the PRESENT-80 cryptographic algorithm implemented using ER computing consumes 45% less power as compared to its CMOS implementation. Further, ER computing in emerging devices such as FinFET and Tunnel FET to design low-power hardware security primitives is also illustrated.
|Title of host publication||2018 IEEE International Conference on Consumer Electronics, ICCE 2018|
|Editors||Saraju P. Mohanty, Peter Corcoran, Hai Li, Anirban Sengupta, Jong-Hyouk Lee|
|Number of pages||6|
|State||Published - Mar 26 2018|
|Event||2018 IEEE International Conference on Consumer Electronics, ICCE 2018 - Las Vegas, United States|
Duration: Jan 12 2018 → Jan 14 2018
|Name||2018 IEEE International Conference on Consumer Electronics, ICCE 2018|
|Conference||2018 IEEE International Conference on Consumer Electronics, ICCE 2018|
|Period||1/12/18 → 1/14/18|
Bibliographical notePublisher Copyright:
© 2018 IEEE.
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Media Technology