{"title":"用于安全保护的片上CMOS自解耦电池系统","authors":"R. Muresan","doi":"10.1109/CJECE.2019.2949934","DOIUrl":null,"url":null,"abstract":"This article presents an effective on-chip power analysis attack countermeasure based on a new CMOS self-decoupling battery cell system that uses a self-decoupling circuit. The self-decoupling circuit dynamically controls an on-chip virtual power supply point, <inline-formula> <tex-math notation=\"LaTeX\">$V_{\\mathrm {ddv}}$ </tex-math></inline-formula>, that can be used to power security-sensitive modules. The circuit automatically decouples an on-chip CMOS battery cell from powering a sensitive module when its voltage level reaches a designed minimum threshold level <inline-formula> <tex-math notation=\"LaTeX\">$V_{\\mathrm {dd-min}}$ </tex-math></inline-formula> and connects it for a very short charging cycle to the chip’s main voltage supply, <inline-formula> <tex-math notation=\"LaTeX\">$V_{\\mathrm {dd}}$ </tex-math></inline-formula>. The charging cycles for the experiments presented in this article are less than 10 ns and are designed to support the CMOS battery cell size and the minimum designed threshold voltage level <inline-formula> <tex-math notation=\"LaTeX\">$V_{\\mathrm {dd-min}}$ </tex-math></inline-formula>. Simulation results of test designs implemented in the 45-nm CMOS technology process show that the proposed countermeasure is efficient when used with battery cell sizes that can power the protected cryptographic module for more than ten data operation cycles before recharging. In addition, using the on-chip self-decoupling battery cell system allows for power consumption savings within the protected module of up to 43 % due to the dynamic voltage scaling generated at the virtual power supply point.","PeriodicalId":55287,"journal":{"name":"Canadian Journal of Electrical and Computer Engineering-Revue Canadienne De Genie Electrique et Informatique","volume":null,"pages":null},"PeriodicalIF":1.7000,"publicationDate":"2020-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/CJECE.2019.2949934","citationCount":"2","resultStr":"{\"title\":\"On-Chip CMOS Self-Decoupling Battery Cell System for Security Protection\",\"authors\":\"R. Muresan\",\"doi\":\"10.1109/CJECE.2019.2949934\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article presents an effective on-chip power analysis attack countermeasure based on a new CMOS self-decoupling battery cell system that uses a self-decoupling circuit. The self-decoupling circuit dynamically controls an on-chip virtual power supply point, <inline-formula> <tex-math notation=\\\"LaTeX\\\">$V_{\\\\mathrm {ddv}}$ </tex-math></inline-formula>, that can be used to power security-sensitive modules. The circuit automatically decouples an on-chip CMOS battery cell from powering a sensitive module when its voltage level reaches a designed minimum threshold level <inline-formula> <tex-math notation=\\\"LaTeX\\\">$V_{\\\\mathrm {dd-min}}$ </tex-math></inline-formula> and connects it for a very short charging cycle to the chip’s main voltage supply, <inline-formula> <tex-math notation=\\\"LaTeX\\\">$V_{\\\\mathrm {dd}}$ </tex-math></inline-formula>. The charging cycles for the experiments presented in this article are less than 10 ns and are designed to support the CMOS battery cell size and the minimum designed threshold voltage level <inline-formula> <tex-math notation=\\\"LaTeX\\\">$V_{\\\\mathrm {dd-min}}$ </tex-math></inline-formula>. Simulation results of test designs implemented in the 45-nm CMOS technology process show that the proposed countermeasure is efficient when used with battery cell sizes that can power the protected cryptographic module for more than ten data operation cycles before recharging. In addition, using the on-chip self-decoupling battery cell system allows for power consumption savings within the protected module of up to 43 % due to the dynamic voltage scaling generated at the virtual power supply point.\",\"PeriodicalId\":55287,\"journal\":{\"name\":\"Canadian Journal of Electrical and Computer Engineering-Revue Canadienne De Genie Electrique et Informatique\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2020-01-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1109/CJECE.2019.2949934\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Canadian Journal of Electrical and Computer Engineering-Revue Canadienne De Genie Electrique et Informatique\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CJECE.2019.2949934\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Canadian Journal of Electrical and Computer Engineering-Revue Canadienne De Genie Electrique et Informatique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CJECE.2019.2949934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Engineering","Score":null,"Total":0}
On-Chip CMOS Self-Decoupling Battery Cell System for Security Protection
This article presents an effective on-chip power analysis attack countermeasure based on a new CMOS self-decoupling battery cell system that uses a self-decoupling circuit. The self-decoupling circuit dynamically controls an on-chip virtual power supply point, $V_{\mathrm {ddv}}$ , that can be used to power security-sensitive modules. The circuit automatically decouples an on-chip CMOS battery cell from powering a sensitive module when its voltage level reaches a designed minimum threshold level $V_{\mathrm {dd-min}}$ and connects it for a very short charging cycle to the chip’s main voltage supply, $V_{\mathrm {dd}}$ . The charging cycles for the experiments presented in this article are less than 10 ns and are designed to support the CMOS battery cell size and the minimum designed threshold voltage level $V_{\mathrm {dd-min}}$ . Simulation results of test designs implemented in the 45-nm CMOS technology process show that the proposed countermeasure is efficient when used with battery cell sizes that can power the protected cryptographic module for more than ten data operation cycles before recharging. In addition, using the on-chip self-decoupling battery cell system allows for power consumption savings within the protected module of up to 43 % due to the dynamic voltage scaling generated at the virtual power supply point.
期刊介绍:
The Canadian Journal of Electrical and Computer Engineering (ISSN-0840-8688), issued quarterly, has been publishing high-quality refereed scientific papers in all areas of electrical and computer engineering since 1976