A Comparison of Circuit Implementations from a Security Perspective (Electrical Project)

Get this Project:

Fields with * are mandatory

In the late 90’s research showed that all circuit implementations were susceptible to power analysis and that this analysis could be used to extract secret information. Further research to counteract this new threat by adding counter measures or modifying the nderlaying algorithm only seemed to slow down the attack.

There were no objective analysis of how different circuit implementations leak information and by what magnitude.

This study will present such an objective comparison on five different logic styles. The comparison results are based on simulations performed on transistor level and show that it is possible to implement circuits in a more secure and easier way than what has been previously suggested.
Source: Linköping University
Author: Sundström, Timmy

Download Project

Get this Project:

Fields with * are mandatory

Leave a Comment

Your email address will not be published. Required fields are marked *