UKY-Computer Science Keeping Current 2017-03-08 - Himanshu Thapliyal
Abstract: With the emergence of the Internet of Things (IoT), there is an urgent need to design energy-efficient and secure IoT devices such as RFID chips and smart cards. Their encryption keys are susceptible to side-channel attacks. Among these attacks, the Differential Power Analysis (DPA) attack is one of the most prominent. DPA correlates the secret key with instantaneous power consumption when the device performs encryption or decryption. Any improvement in security leads to reduction in battery life. I introduce adiabatic computing, which recycles the charge stored in the load capacitor and operates efficiently at low frequencies. Adiabatic computing is a promising appoach for energy-efficient solutions to security challenges in IoT devices.
Abstract: With the emergence of the Internet of Things (IoT), there is an urgent need to design energy-efficient and secure IoT devices such as RFID chips and smart cards. Their encryption keys are susceptible to side-channel attacks. Among these attacks, the Differential Power Analysis (DPA) attack is one of the most prominent. DPA correlates the secret key with instantaneous power consumption when the device performs encryption or decryption. Any improvement in security leads to reduction in battery life. I introduce adiabatic computing, which recycles the charge stored in the load capacitor and operates efficiently at low frequencies. Adiabatic computing is a promising appoach for energy-efficient solutions to security challenges in IoT devices.