subthreshold sram designs for cryptography security computations adnan gutub the second...
TRANSCRIPT
Subthreshold SRAM Designs for
Cryptography Security Computations
Adnan Gutub
The Second International Conference on Software Engineering and Computer Systems
(ICSECS2011)
University Pahang Malaysia27-29 June 2011
Umm Al-Qura University, Makkah Saudi Arabia
OutlineIntroductionBackgroundcrypto-system complexityCMOS SRAM for Crypto DesigningSRAM Potential & Power
reductionReliability of Low-Power SRAMlow power SRAM designsRemarks
IntroductionSaving Power: cryptographic
computations hardware designs◦performance ◦transistor count
power consumption = a real problem.
Reliability : balance of ◦Performance ◦energy utilization
BackgroundBefore: Efficiency of hardware
power consumption depended on ◦device technology ◦circuit optimization
Currently: new solutions power utilization problems ◦Computer architecture ◦electronics engineering
crypto-system complexity
difficulty and time consuming◦ hardware modeling◦ verifications
analysis of power and performance ◦ early stages of hardware designing ◦ avoid starting again every time
cryptography hardware designing ◦ top-level: structured or behavioral ◦ circuit optimizations:
logical level gate level semiconductor devices
crypto-system complexity
low power design methods: all design levels independently◦So complete crypto hardware system
benefit from total power efficiency gained.
◦Many technology tools have been developed for industrial general designing purposes
◦Accordingly, power estimation studies at architecture level are becoming a more important research subject
CMOS SRAM for Crypto Designing
Cryptographic hardware = problem of power consumption = crypto memory = CMOS memory power optimization
CMOS memory circuits optimization = utilizing subthreshold leakage
CMOS technology = improving = supply voltage, VDD = decreasing, = threshold voltage, VTH,= decrease
crypto-computation circuit performance (speed) = practical level = lowering VDD and VTH,
portable small devices (i.e. notebooks, mobiles, smartcards…etc) = subthreshold CMOS transistors in crypto hardware design and operation is getting important
CMOS SRAM for Crypto Designing
Standard 6T SRAM Cell
SRAM Potential & Power reductionKeep: 6T SRAM cell structureModify:
◦voltages Increasing VDD & VTH (shifting the voltage
swing) more speed reduce leakage power consumption
◦transistors sizes & design it self transistor sizing and adding a sleep
transistor before connecting the cell to ground
SRAM Potential & Power reduction◦transistors sizes & design it self
Adding sleep transistor before
connecting the cell to
ground
SRAM Potential & Power reduction◦transistors sizes & design it self
change standard
design number of transistors and
invent new
structure by adding power
efficiency transistors
Reliability of Low-Power SRAM
low power SRAM designs save energy = transistors become more sensitive to soft errors
Soft errors can change values of bits stored leading to functionality failures = very serious in crypto applications.
Remarks All hardware architecture power reduction is lacking
consistency cryptography and security hardware designing low-power
consideration resulted in the need to develop specific energy-efficient algorithm-flexible hardware.
Reconfigurable Domain-specific SRAM memory designs are what is needed to provide the required flexibility.
it may not payback without gaining the high overhead costs related to the generic reprogrammable designs resulting implementations capable of performing the entire suite of cryptographic primitives over all crypto arithmetic operations.
The technology is moving toward ultra-low-power mode where the hardware processors power consumption should be reduced much.
Measured performance and energy efficiency indicate a comparable level of performance to most reported dedicated hardware implementations, while providing all of the flexibility of a software-based implementation
Q & A