Repository logo
Log In(current)
  1. Home
  2. Colleges & Schools
  3. Graduate School
  4. Masters Theses
  5. Post-Layout Evaluation of Adiabatic Logic for Energy Efficiency and CPA Resistance
Details

Post-Layout Evaluation of Adiabatic Logic for Energy Efficiency and CPA Resistance

Date Issued
May 1, 2024
Author(s)
Chin, Jun-Cheng  
Advisor(s)
Himanshu Thapliyal
Additional Advisor(s)
Nicole McFarlane, Benjamin J. Blalock
Abstract

The Internet of Things (IoT) has become commonplace in society, but it has been demonstrated that many IoT systems are vulnerable to significant security exploits. This necessitates the need for a closer examination of IoT security. IoT design prerequisites are low power consumption and an emphasis on smaller die areas for increased production yield. Security on the software level typically provides adequate protection but there are hardware-level exploits that are difficult or impossible to counteract. Booting attacks, eavesdropping and interference, and Side-Channel Attacks (SCA) are exploits deployed against IoT devices on the hardware level. To combat these vulnerabilities, several lightweight hardware encryption techniques such as PRESENT-80, in particular, are developed for their lower power usage and smaller device footprint. However, studies show that PRESENT-80 is still vulnerable to SCA or power analysis attacks. Literature on improved PRESENT-80 circuits provides SCA resistance but the trade-offs are often an increase in device area and distinguishable power usage patterns.


A recently developed adiabatic circuit technique introduced as Energy Efficient Positive Feedback Adiabatic Logic (EE-SPFAL) shows promise of resistance against SCA and consumes lower power compared to traditional CMOS digital circuits. However, the simulation results are solely presented through the schematic layer without the inclusion of post-layout simulation. This work aims to fill the gap by providing the layout design of EE-SPFAL standard cells and a prototype of 1 Round PRESENT-80 S-box using EE-SPFAL. Post-layout Correlation Power Analysis (CPA) attacks and energy consumption analysis are conducted and compared with the conventional CMOS circuit. In addition, this work aims to show the effects of parasitic capacitance within inter-logic cell routing on SCA resistance and highlight the limitations of schematic-only simulations against CPA attacks. This work is designed using open-source CAD tools from Efabless/Google with Skywater 130nm technology.

Subjects

Adiabatic

Lightweight Hardware ...

PRESENT80

EE-SPFAL

Skywater 130nm

Side Channel Attack

Disciplines
Electrical and Electronics
Electronic Devices and Semiconductor Manufacturing
Degree
Master of Science
Major
Electrical Engineering
File(s)
Thumbnail Image
Name

MS_thesis_04252024_FINAL.pdf

Size

9.67 MB

Format

Adobe PDF

Checksum (MD5)

095b06fa5a14926dd519a0df84b5d129

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
  • Contact
  • Libraries at University of Tennessee, Knoxville
Repository logo COAR Notify