Abstract
Counterfeiting is a major problem plaguing global supply chains. While small low-cost tagging solutions for supply-chain management exist, security in the face of fault-injection [1] and side-channel attacks [2] remains a concern. Power glitch attacks [3] in particular attempt to leak key-bits by inducing fault conditions during cryptographic operation through the use of over-voltage and under-voltage conditions. This paper presents the design of a secure authentication tag with wireless power and data delivery optimized for compact size and near-field applications. Power-glitch attacks are mitigated through state backup on FeRAM based non-volatile flip-flops (NVDFFs) [4]. The tag uses Keccak [5] (the cryptographic core of SHA3) to update the key before each protocol invocation, limiting side-channel leakage to a single trace per key.
| Original language | English |
|---|---|
| Title of host publication | 2016 IEEE International Solid-State Circuits Conference, ISSCC 2016 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 290-291 |
| Number of pages | 2 |
| ISBN (Electronic) | 9781467394666 |
| DOIs | |
| Publication status | Published - 2016 Feb 23 |
| Externally published | Yes |
| Event | 63rd IEEE International Solid-State Circuits Conference, ISSCC 2016 - San Francisco, United States Duration: 2016 Jan 31 → 2016 Feb 4 |
Publication series
| Name | Digest of Technical Papers - IEEE International Solid-State Circuits Conference |
|---|---|
| Volume | 59 |
| ISSN (Print) | 0193-6530 |
Conference
| Conference | 63rd IEEE International Solid-State Circuits Conference, ISSCC 2016 |
|---|---|
| Country/Territory | United States |
| City | San Francisco |
| Period | 16/1/31 → 16/2/4 |
Bibliographical note
Publisher Copyright:© 2016 IEEE.
ASJC Scopus subject areas
- Electronic, Optical and Magnetic Materials
- Electrical and Electronic Engineering
Fingerprint
Dive into the research topics of 'A Keccak-based wireless authentication tag with per-query key update and power-glitch attack countermeasures'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS