Top Banner
Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems (ICSECS2011) University Pahang Malaysia 27-29 June 2011 Umm Al-Qura University, Makkah Saudi Arabia
14

Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

Mar 31, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

Subthreshold SRAM Designs for

Cryptography Security Computations

Adnan Gutub

The Second International Conference on  Software Engineering and Computer Systems

(ICSECS2011)

University Pahang Malaysia27-29 June 2011

Umm Al-Qura University, Makkah Saudi Arabia

Page 2: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

OutlineIntroductionBackgroundcrypto-system complexityCMOS SRAM for Crypto DesigningSRAM Potential & Power

reductionReliability of Low-Power SRAMlow power SRAM designsRemarks

Page 3: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

IntroductionSaving Power: cryptographic

computations hardware designs◦performance ◦transistor count

power consumption = a real problem.

Reliability : balance of ◦Performance ◦energy utilization

Page 4: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

BackgroundBefore: Efficiency of hardware

power consumption depended on ◦device technology ◦circuit optimization

Currently: new solutions power utilization problems ◦Computer architecture ◦electronics engineering

Page 5: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

crypto-system complexity

difficulty and time consuming◦ hardware modeling◦ verifications

analysis of power and performance ◦ early stages of hardware designing ◦ avoid starting again every time

cryptography hardware designing ◦ top-level: structured or behavioral ◦ circuit optimizations:

logical level gate level semiconductor devices

Page 6: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

crypto-system complexity

low power design methods: all design levels independently◦So complete crypto hardware system

benefit from total power efficiency gained.

◦Many technology tools have been developed for industrial general designing purposes

◦Accordingly, power estimation studies at architecture level are becoming a more important research subject

Page 7: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

CMOS SRAM for Crypto Designing

Cryptographic hardware = problem of power consumption = crypto memory = CMOS memory power optimization

CMOS memory circuits optimization = utilizing subthreshold leakage

CMOS technology = improving = supply voltage, VDD = decreasing, = threshold voltage, VTH,= decrease

crypto-computation circuit performance (speed) = practical level = lowering VDD and VTH,

portable small devices (i.e. notebooks, mobiles, smartcards…etc) = subthreshold CMOS transistors in crypto hardware design and operation is getting important

Page 8: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

CMOS SRAM for Crypto Designing

Standard 6T SRAM Cell

Page 9: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

SRAM Potential & Power reductionKeep: 6T SRAM cell structureModify:

◦voltages Increasing VDD & VTH (shifting the voltage

swing) more speed reduce leakage power consumption

◦transistors sizes & design it self transistor sizing and adding a sleep

transistor before connecting the cell to ground

Page 10: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

SRAM Potential & Power reduction◦transistors sizes & design it self

Adding sleep transistor before

connecting the cell to

ground

Page 11: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

SRAM Potential & Power reduction◦transistors sizes & design it self

change standard

design number of transistors and

invent new

structure by adding power

efficiency transistors

Page 12: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

Reliability of Low-Power SRAM

low power SRAM designs save energy = transistors become more sensitive to soft errors

Soft errors can change values of bits stored leading to functionality failures = very serious in crypto applications.

Page 13: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

Remarks All hardware architecture power reduction is lacking

consistency cryptography and security hardware designing low-power

consideration resulted in the need to develop specific energy-efficient algorithm-flexible hardware.

Reconfigurable Domain-specific SRAM memory designs are what is needed to provide the required flexibility.

it may not payback without gaining the high overhead costs related to the generic reprogrammable designs resulting implementations capable of performing the entire suite of cryptographic primitives over all crypto arithmetic operations.

The technology is moving toward ultra-low-power mode where the hardware processors power consumption should be reduced much.

Measured performance and energy efficiency indicate a comparable level of performance to most reported dedicated hardware implementations, while providing all of the flexibility of a software-based implementation

Page 14: Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.

Q & A