KEYNOTE OF THE FUTURE 2: EMMA McLARNON CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.

Slides:



Advertisements
Similar presentations
Avin Tamsir, Jeffrey J. Tabor & Christopher A. Voight.
Advertisements

Digital Components Introduction Gate Characteristics Logic Families
CRT RSA Algorithm Protected Against Fault Attacks WISTP - 5/10/07 Arnaud BOSCHER Spansion EMEA Robert NACIRI Oberthur Card Systems Emmanuel PROUFF Oberthur.
Differential Power Analysis of Smartcards How secure is your private information? Author: Ryan Junee Supervisor: Matt Barrie.
Cryptography and Data Security: Long-Term Challenges Burt Kaliski, RSA Security Northeastern University CCIS Mini Symposium on Information Security November.
Cambridge, Massachusetts Analog Logic Ben Vigoda.
Superdistribution --- The Concept and the Architecture Ryoichi Mori and Masaji Kawahara presented by Ping Xu 1. Introduction to Superdistribution 2. Protect.
1 Authors: MILENA STANOJLOVIĆ PREDRAG PETKOVIĆ LABORATORY FOR ELECTRONIC DESIGN AUTOMATION Faculty of Electronic Engineering University of Nis.
Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS Singapore.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
The Physically Observable Security of Signature Schemes Alexander W. Dent Joint work with John Malone-Lee University of Bristol.
Side-Channel Attacks on Smart Cards. Timing Analysis Cryptosystems take different amount of time to process different inputs. Performance optimisations.
Design and Implementation of VLSI Systems (EN0160) Sherief Reda Division of Engineering, Brown University Spring 2007.
CMOS VLSI For Computer Engineering Lecture 4 – Logical Effort Prof. Luke Theogarajan parts adapted form Harris – and Rabaey-
Emerging Technologies – A Critical Review Presenter: Qufei Wu 12/05/05.
Emerging Logic Devices
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
Torturing OpenSSL Todd Austin University of Michigan with Andrea Pellegrini, William Arthur and Valeria Bertacco (Based on Valeria’s BlackHat 2012 Presentation)
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
ULTRAWIDEBAND TECHNOLOGY FOR CREATING A WIRELESS WORLD.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
TEMPLATE DESIGN © Gate-Diffusion Input (GDI) Technique for Low Power CMOS Logic Circuits Design Yerkebulan Saparov, Aktanberdi.
Basic MOSFET I-V characteristic(1/3) High circuit operation speed  large I ON small Subthreshold Slope (SS) Low power consumption  small I OFF (Silicon-on-insulator.
Gerousis Toward Nano-Networks and Architectures C. Gerousis and D. Ball Department of Physics, Computer Science and Engineering Christopher Newport University.
Digital Logic Structures. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 3-2 Roadmap Problems Algorithms.
Digital Logic. 4 Why is 32-bit or 64-bit significant in terms of speed, efficiency? 4 Difference between OR and XOR 4 What is a mux for? PLA 4 Two kinds.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Centro de Electrónica Industrial (CEI) | Universidad Politécnica de Madrid | | Side Channel Attack (SCA) is a special attak method.
EPassports EAC Conformity & Interoperability Tests, Prague September 7-12, 2008 When an e-Passport Talks and it Should Not Martin Hlaváč and Tomáš Rosa.
Smart card security Nora Dabbous Security Technologies Department.
Advanced Information Security 6 SIDE CHANNEL ATTACKS Dr. Turki F. Al-Somani 2015.
Bayesian Macromodeling for Circuit Level QCA Design Saket Srivastava and Sanjukta Bhanja Department of Electrical Engineering University of South Florida,
Projekt „ESSNBS“ Niš, November 4 th – 7 th, DAAD Design and Simulation of Multiplexer Cell Resistant to Side Channel Attacks.
Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms Sarani Bhattacharya and Debdeep Mukhopadhyay Dept. of Computer Science and.
Playing God: The Engineering of Functional Designs in the Game of Life Liban Mohamed Computer Systems Research Lab
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Linear Algebra. Circuits The circuits in computers and other input devices have inputs, each of which is either a 0 or 1, the output is also 0s and 1s.
University of Notre Dame Lecture 19 - Intro to MQCA Nanomagnetic Logic Devices.
Enhanced Doublng Attacks on Signed-All-Bits Set Recoding 1 Graduate School of Information Management and Security, Korea University, Korea
CMOS Logic.  The CMOS Logic uses a combination of p-type and n-type Metal-Oxide-Semiconductor Field Effect Transistors (MOSFETs) to implement logic gates.
1 The piezoelectronic transistor: A nanoactuator-based post-CMOS digital switch with high speed and low power Class: Bio MEMS Components and System Teacher.
Introduction to Nano- computing for K-8 Students Sanjukta Bhanja and Javier Pulecio Assistant Professor, PhD student University of South Florida.
Exploiting Cache-Timing in AES: Attacks and Countermeasures Ivo Pooters March 17, 2008 Seminar Information Security Technology.
Molecular Scale Architectures Quantum Cellular Automata and Molecular Combinatorial Logic By Jeff Kramer.
THE IMPORTANCE OF DISCRETE MATHEMATICS IN COMPUTER TECHNOLOGY.
Azam Supervisor : Prof. Raj Jain
A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University.
S. E. Thompson EEL Quantum cellular Automata Quantum Cellular Automata (QCA) refers to any one of several models of quantum computation, which have.
Clocked Molecular Quantum-dot Cellular Automata
CS151 Introduction to Digital Design Chapter 2: Combinational Logic Circuits Lecture 5: Binary Logic and Gates.
CMOS Logic Gates. NMOS transistor acts as a switch 2 When gate voltage is 0 V No channel is formed current does not flow easily “open switch” When gate.
Bayesian Modeling of Quantum-Dot-Cellular-Automata Circuits Sanjukta Bhanja and Saket Srivastava Electrical Engineering, University of South Florida, Tampa,
Reut Caspi & Moriah Stern Advisors: Dr. Osnat Keren & Mr. Itamar Levi.
KEYNOTE OF THE FUTURE 1: CIARA MOORE CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
WELCOME.
ICT Unit 4: Network and the effects of using them
Overview on Hardware Security
Advanced Information Security 6 Side Channel Attacks
On The Feasibility of Internal-Nodes Power Analysis
Emerging Logic Devices
Survey of Crypto CoProcessor Design
Efficient CRT-Based RSA Cryptosystems
High-Level Synthesis for Side-Channel Defense
Discrete Mathematics CS 2610
Excursions into Logic Based Computation using Conway’s Game of Life
1.Introduction to Advanced Digital Design (14 marks)
Presentation transcript:

KEYNOTE OF THE FUTURE 2: EMMA McLARNON CSIT PhD Student QUEEN’S UNIVERSITY BELFAST

@CSIT_QUB Keynote of the Future Quantum-dot Cellular Automata Emma McLarnon 20/03/2015

CMOS – Existing issues CMOS is the underlying technology in a wide range of electronic devices With the advent of IoT, security of electronic devices is becoming an important issue New attacks being developed daily Countermeasures put in place © © ©

Power Analysis Attack CMOS – Existing issues Security algorithms implemented in CMOS are vulnerable to Side Channel Attacks (SCA), as they leak information through power consumption, EM, timings of operations. By monitoring the power, the secret key can be revealed

Simple Power Analysis Attack S – squaring M – multiplication KEY! RSA is mathematically the strongest and the most common security algorithm today However, looking at the power waveform the secret key can be revealed CMOS – Existing issues

Quantum-Dot Cellular Automata – Overview CMOS is due to reach its physical scaling limits by 2019 (ITRS report) Post-CMOS options are being researched, QCA being one of them No current, only information, flows between cells Since no data-dependent currents => may be resistant to power analysis attacks QCA Cell Structure logic ‘0’ logic ‘1’

Quantum-Dot Cellular Automata - Overview

Quantum-Dot Cellular Automata - Gates Use QCA cells to build security algorithm designs QCA Inverter QCA Majority Gate Majority gate can be converted to AND gate or an OR gate Combination of these components can be used for implementation of any logic function

QCA - Conclusions As CMOS is reaching the end of the technology roadmap, QCA is being considered as the next generation technology QCA will be highly dense, provide high speed computing and low power consumption Strong advantage in terms of security as there is no current flow, the coulombic repulsion between QCA cells are what provides the information transfer QCA could be a niche technology for security applications due to its resistance to side channel attacks

Thank you for listening