GLiTCH: GLiTCH induced Transitions for Secure Crypto-Hardware
Conventionally, glitch reduction is well-studied in digital design to improve power, efficiency, and security. In contrast, this paper combines the addition and removal of glitches to minimize the power side-channel leakage. Glitch Manipulation is achieved through gate sizing-based arrival time cont...
Saved in:
| Published in: | 2025 62nd ACM/IEEE Design Automation Conference (DAC) pp. 1 - 7 |
|---|---|
| Main Authors: | , , , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
22.06.2025
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Conventionally, glitch reduction is well-studied in digital design to improve power, efficiency, and security. In contrast, this paper combines the addition and removal of glitches to minimize the power side-channel leakage. Glitch Manipulation is achieved through gate sizing-based arrival time control, which is cast as a Geometric Programming formulation. We develop a framework, GLiTCH, for glitch manipulation that is guided by functional and timing simulations. The framework is evaluated on popular cipher designs like AES, CLEFIA, and SM4. Our findings illustrate up to 52.82% improvement in the Guessing Entropy for a 38.74% area overhead on average across the evaluated ciphers. |
|---|---|
| AbstractList | Conventionally, glitch reduction is well-studied in digital design to improve power, efficiency, and security. In contrast, this paper combines the addition and removal of glitches to minimize the power side-channel leakage. Glitch Manipulation is achieved through gate sizing-based arrival time control, which is cast as a Geometric Programming formulation. We develop a framework, GLiTCH, for glitch manipulation that is guided by functional and timing simulations. The framework is evaluated on popular cipher designs like AES, CLEFIA, and SM4. Our findings illustrate up to 52.82% improvement in the Guessing Entropy for a 38.74% area overhead on average across the evaluated ciphers. |
| Author | Menon, C. Rohin Valiveti, Annapurna Viraraghavan, Janakiraman Rebeiro, Chester Balasubramanian, Jayanth Akshay Kumar, E |
| Author_xml | – sequence: 1 givenname: C. Rohin surname: Menon fullname: Menon, C. Rohin email: rohin@cse.iitm.ac.in organization: Indian Institute of Technology Madras,India – sequence: 2 givenname: Jayanth surname: Balasubramanian fullname: Balasubramanian, Jayanth email: ee20b050@smail.iitm.ac.in organization: Indian Institute of Technology Madras,India – sequence: 3 givenname: E surname: Akshay Kumar fullname: Akshay Kumar, E organization: Indian Institute of Technology Madras,India – sequence: 4 givenname: Annapurna surname: Valiveti fullname: Valiveti, Annapurna organization: Indian Institute of Technology Madras,India – sequence: 5 givenname: Chester surname: Rebeiro fullname: Rebeiro, Chester organization: Indian Institute of Technology Madras,India – sequence: 6 givenname: Janakiraman surname: Viraraghavan fullname: Viraraghavan, Janakiraman organization: Indian Institute of Technology Madras,India |
| BookMark | eNo1j81KAzEURiPoQmvfQCQvMDXJzc2P4KKM2goDLqzrkszcgYBmSmaK9O0dqK4OnMXh-27YZR4yMXYvxUpK4R-e17UBp_1KCYWzkgAC7QVbeusdgEQBQrtr9rRp0q7ePvIzecrdsaWO70rIY5rSkEfeD4V_UHssxOtyOkxDtQ2l-wmFbtlVH75GWv5xwT5fX-ZM1bxv3up1UwVp_VRZ3YOUXe8URWw9Eiq0MYrZmIgianKtDfNA7RVKazSQ0S5GE40htAIW7O7cTUS0P5T0Hcpp__8KfgERcES5 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/DAC63849.2025.11133057 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798331503048 |
| EndPage | 7 |
| ExternalDocumentID | 11133057 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IH CBEJK RIE RIO |
| ID | FETCH-LOGICAL-a179t-74f311df82eb5c95e5257bb0df86b50b4e8c7a305492517643e648bb6b66e5703 |
| IEDL.DBID | RIE |
| IngestDate | Wed Oct 01 07:05:15 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a179t-74f311df82eb5c95e5257bb0df86b50b4e8c7a305492517643e648bb6b66e5703 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_11133057 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-June-22 |
| PublicationDateYYYYMMDD | 2025-06-22 |
| PublicationDate_xml | – month: 06 year: 2025 text: 2025-June-22 day: 22 |
| PublicationDecade | 2020 |
| PublicationTitle | 2025 62nd ACM/IEEE Design Automation Conference (DAC) |
| PublicationTitleAbbrev | DAC |
| PublicationYear | 2025 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 2.295383 |
| Snippet | Conventionally, glitch reduction is well-studied in digital design to improve power, efficiency, and security. In contrast, this paper combines the addition... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Ciphers Design automation Entropy gate-resizing geometric programming Glitches Logic gates Programming Security Side-channel attacks Timing |
| Title | GLiTCH: GLiTCH induced Transitions for Secure Crypto-Hardware |
| URI | https://ieeexplore.ieee.org/document/11133057 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoxcAEiCK-5YHVbZImdozEgAKFoao6AOpW2c5Z6pJWIQXx77lzWhADA5MjK5HtnON3se-9Y-xa57gu6shQnJ8SKYKAsGh54bxD8PYyywJ97HWsJpN8NtPTDVk9cGEAIASfQZ8uw1l-uXRr2iobUFp0nJ-qwzpKyZastWH9xpEe3N8VOJtSop8kWX9786-0KQE1Rvv_bO-A9X74d3z6jSyHbAeqI3b7OF48F083vC05_kyjWUoe0KYNvOLogfKwgw68qD9XzVLQyfyHqaHHXkYP-JjYJD8QBr-RRqjUD-O49HkCNnM6A5IttTbCGmmzyKaQO2Wwd6QuGCt0LECmubXSSgkkq3XMutWyghPGQSvvdOKlLYHUYoyKzbDMPTp7TmqTnrIejX2-avUt5tthn_1Rf8726A1TwFSSXLBuU6_hku2692bxVl8Fq3wBwriMOw |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED1BQYIJEEV844HVbRISO0ZiQIVSRKg6FNStsp2L1KWtQgri33N2UxADA5MjK5HtnON3se-9A7hUKa2LKtAuzk_ymECAG7I8t4Ul8C5Eknj62Gsm-_10NFKDmqzuuTCI6IPPsOUu_Vl-PrMLt1XWdmnRaX7KddhwqbNqulbN-w0D1b677dB8ih0BJUpaq9t_JU7xuNHd-WeLu9D8YeCxwTe27MEaTvfh5iGbDDu9a7YsGf1Ok2Fy5vFmGXrFyAdlfg8dWaf8nFcz7s7mP3SJTXjp3tNjvE5_wDV9JRWXcXEVhnmRRmgSqxJ0wqXGBFQjTBKYGFMrNfXO6QuGklwLFHFqjDBCoBPWOoDGdDbFQ2CoZGFVVAiTo9OL0TLUV3lakLtnhdLxETTd2MfzpcLFeDXs4z_qL2CrN3zOxtlj_-kEtt3bduFTUXQKjapc4Bls2vdq8laeewt9AUSpj4Q |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2025+62nd+ACM%2FIEEE+Design+Automation+Conference+%28DAC%29&rft.atitle=GLiTCH%3A+GLiTCH+induced+Transitions+for+Secure+Crypto-Hardware&rft.au=Menon%2C+C.+Rohin&rft.au=Balasubramanian%2C+Jayanth&rft.au=Akshay+Kumar%2C+E&rft.au=Valiveti%2C+Annapurna&rft.date=2025-06-22&rft.pub=IEEE&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FDAC63849.2025.11133057&rft.externalDocID=11133057 |