Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
RECONFIGURABLE LOGIC CIRCUIT
Document Type and Number:
WIPO Patent Application WO/2019/101660
Kind Code:
A1
Abstract:
The present invention relates to a reconfigurable logic circuit comprising - a first, second and third switching circuit arranged for receiving a first input bit, a second input bit and a third input bit, respectively, and each arranged for being configured in a mode wherein the corresponding input bit is passed on or in a mode wherein a fixed logical zero or one is passed on, - a first exclusive OR logic block operable on the outputs of said first, second and third switching circuit and arranged to output a sum bit, - a fourth, fifth and sixth switching circuit arranged for receiving a fourth input bit, a fifth input bit and a sixth input bit and arranged for being configured in a mode wherein the corresponding input bit is passed on or in a mode wherein a fixed logical zero or one is passed on, - a first, second and third AND logic block, each arranged for receiving a different pair of the outputs of said fourth, fifth and sixth switching circuit, - a second exclusive OR logic block operable on the outputs of said first, second and third AND logic block and arranged to produce a carry output bit.

Inventors:
MENTENS NELE (BE)
REGAZZONI FRANCESCO (CH)
CHARBON EDOARDO (CH)
Application Number:
PCT/EP2018/081673
Publication Date:
May 31, 2019
Filing Date:
November 19, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
UNIV LEUVEN KATH (BE)
ECOLE POLYTHECHNIQUE FED DE LAUSANNE EPFL (CH)
UNIV DELLA SVIZZERA ITALIANA (CH)
International Classes:
H03K19/177
Foreign References:
US6140839A2000-10-31
US20070241780A12007-10-18
Other References:
A.J. ELBIRT ET AL: "An instruction-level distributed processor for symmetric-key cryptography", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS., vol. 16, no. 5, 1 May 2005 (2005-05-01), US, pages 468 - 480, XP055561052, ISSN: 1045-9219, DOI: 10.1109/TPDS.2005.51
Attorney, Agent or Firm:
VAN BLADEL, Marc et al. (BE)
Download PDF:
Claims:
Claims

1. Reconfigurable logic circuit comprising

- a first, second and third switching circuit arranged for receiving a first input bit, a second input bit and a third input bit, respectively, and each arranged for being configured in a mode wherein the corresponding input bit is passed on or in a mode wherein a fixed logical zero or one is passed on,

- a first exclusive OR logic block operable on the outputs of said first, second and third switching circuit and arranged to output a sum bit,

- a fourth, fifth and sixth switching circuit arranged for receiving a fourth input bit, a fifth input bit and a sixth input bit and arranged for being configured in a mode wherein the corresponding input bit is passed on or in a mode wherein a fixed logical zero or one is passed on,

- a first, second and third AND logic block, each arranged for receiving a different pair of the outputs of said fourth, fifth and sixth switching circuit,

- a second exclusive OR logic block operable on the outputs of said first, second and third AND logic block and arranged to produce a carry output bit.

2. Reconfigurable logic circuit as in claim 1, wherein at least one of said switching circuits is implemented with an AND logic block arranged for receiving the corresponding input bit and a first configuration bit and a OR logic block arranged for receiving the output of said AND logic block and a second configuration bit.

3. Reconfigurable logic circuit as in claim 2, wherein all switching circuits are implemented with such an AND logic block and OR logic block.

4. Reconfigurable logic circuit as in claim 3, wherein said first and said fourth switching circuit have their second configuration bit set to a logical 0, said third and sixth switching circuit have their first configuration bit set to a logical 1 and said second and fourth switching circuit have their first configuration bit set to a logical 1 and their second configuration bit set to a logical 0.

5. Reconfigurable logic circuit as in any of claims 2 to 4, wherein the order of said AND logic block and said OR logic block is reversed, whereby the output of said OR logic block is arranged to be fed to said AND logic block.

6. Reconfigurable logic circuit as in any of the previous claims, wherein said switching circuits are configurable for implementing one or more of the following functions : an addition modulo 2n, an addition modulo 2 or a substitution box.

7. Reconfigurable logic circuit as in any of the previous claims, wherein said switching circuits are arranged to implement a quadratic function.

8. Slice comprising one or more reconfigurable logic circuits as in in any of the previous claims.

9. Slice as in claim 8, wherein each of said one or more reconfigurable logic circuits has a corresponding flipflop to which at least either said sum bit or said carry output bit can be applied.

10. Slice as in claim 8 or 9, further comprising multiplexing means.

11. Slice as in any of claims 8 to 10, comprising four reconfigurable logic circuits as in in any of claims

1 to 7.

Description:
Reconfigurable Logic Circuit

Field of the invention

[0001] The present invention is generally related to the field of configurable logic circuitry.

More in particular, it relates to configurable logic circuits for use in cryptography.

Background of the invention

[0002] The capability of changing, at least to some extent, or updating the functionality of an electronic system after its deployment has always been desirable. In a typical system composed of hardware and software, such capability is usually guaranteed by software routines. Software, however, despite being extremely flexible, is much slower than its hardware counterpart (sometimes too slow to meet the requirements of the target application). Field Programmable Gate Arrays (FPGAs) have been proposed as a solution to achieve a performance comparable to a dedicated hardware implementation while maintaining the possibility of being updated and reconfigured in the field.

[0003] The first FPGAs consisted of lookup tables which were programmed by means of a configuration file generated according to the function to be implemented. Their use, at that time, was mainly for prototyping and testing designs before fabrication. Soon, however, FPGAs also started to be used as general purpose hardware platforms, since they were extremely suitable for addressing the need of low volume markets, reducing non-recurring engineering costs and allowing the user to access the latest technological nodes at a fraction of the ASIC cost. With the growth of the use of FPGAs as general purpose platforms came the need of having less generic reconfigurable hardware blocks, still capable to implement any design, but including specialized blocks for implementing recurring and relevant functions. As a result, FPGA cells started on the one side to include fast carry chains for arithmetic operations, Digital Signal Processing (DSP) blocks for signal processing and even more complex blocks, such as whole processors. On the other hand, the basic configurable cells evolved to become more and more efficient (SLICEM of Xilinx is a notable example, integrating logic, memory and shift register capabilities). This trend of improving the basic cells while extending the capacity of the specialized cells is certainly going to continue in the future.

[0004] Cryptography is one of the main applications that are often deployed on FPGAs.

Cryptographic primitives, such as block ciphers, public-key algorithms and hash functions have been successfully implemented as stand-alone designs or as part of a complete system-on-chip. Dedicated circuits implementing physical(ly) unclonable functions (PUFs) or bit stream decryption blocks have been added to FPGAs by the vendors. The acceleration capabilities of FPGAs have also been used for realizing dedicated machines for breaking cryptographic algorithms. With the advent of side-channel attacks, FPGAs have been an attractive platform for implementing protected designs as well as for benchmarking the resistance against power analysis attacks.

[0005] In commercial FPGAs combinatorial functions are mapped onto lookup tables (LUTs) as already mentioned. A LUT is implemented as a multiplexer, that has the inputs of the LUT as selection signals and the configuration bits as data inputs. A LUT with n input bits and 1 output bit can be configured with 2 n configuration bits, such that the cell can hold 2 L {2 h } different functions. This way, all types of applications can be mapped onto an FPGA. The FPGA typically further comprises additional logic for implementing fast adders and shift registers.

[0006] The paper “An Instruction-Level Distributed Processor for Symmetric-Key

Cryptography" (A.EIbirt et al., IEEE Trans. Parallel and Distributed Systems, vol.16, no.5, May 2005, pp.468-480) is concerned with a configurable hardware architecture on which block ciphers can be efficiently mapped, so that flexibility can be maintained through reconfiguration capabilities. The proposed solution is capable of high-speed on-the-fly configuration. The following operations are implemented as a part of the reconfigurable cryptographic processor core :

Bitwise XOR, AND or OR

Addition/subtraction modulo 2 s , 2 16 , 2 32

Fixed shift/rotation

Variable data-dependent rotation

Multiplication modulo 2 16 and 2 32 and squaring modulo 2 32

Fixed-field constant multiplication in the Galois field GF(2 8 )

Look-up table substitution of the forms :

o 4-bit to 4-bit with paging mode

o 8-bit to 8-bit

o 8-bit to 32-bit

[0007] The proposed architecture allows for distributed processing across a 128-bit data path via four interconnected 32-bit data paths. Each 32-bit data path interconnects four so-called Reconfigurable Cryptographic Elements (RCEs) which form the basic building blocks. Some RCEs have an additional built-in functional unit allowing for the execution of modular multiplication and squaring. Each RCE operates upon a 32-bit data stream within a 128-bit block. Byte shufflers are provided to allow for bytewise permutations. Each RCE structure is capable of performing the above- mentioned functions.

[0008] When implementing algorithms on the COBRA architecture of Elbirt et al, the algorithms need to be described in a specific assembly code program. A dedicated compiler maps the code onto the architecture. In terms of performance, one can generally state that the COBRA architecture does not reach higher throughput than commercial FPGAs. Further, the COBRA architecture requires more logical resources than commercial FPGA solutions.

[0009] In the paper Ά full-adder based reconfigurable architecture for fine grain applications

: ADAPTO' (Cardarelli et al., IEEE Int'l Conf. on Electronics, Circuits and Systems, pp.1304-1307, May 2008) a reconfigurable architecture wherein LUTs are replaced by another computational element and a simple interconnect network is adopted, is given more flexibility. By use of full-adder based logic blocks an increased hardware efficiency is obtained as well as a reduction of the number of reconfiguration bits. Flowever, the multiplexers in the computational elements introduce a significant overhead in computational resources. Further, the structure in which the computational elements are placed only allows limited connections of the cells through routing, which restricts the architecture.

[0010] The paper Ά Variable Grain Logic Cell Architecture for Reconfigurable Logic Cores'

(Amagasaki et al., IEEE Int'l Conf. on Field Programmable Logic and Applications, pp.550-553, August 2007) concentrates on the higher-level cell architecture. It proposes a technology mapping method to obtain a variable granularity.

[0011] US2007/186203 presents a reconfigurable logic block with a first circuit to configure an arithmetic circuit and a second circuit to configure a circuit outside of the arithmetic circuit. Various circuits are configured by changing the settings of predetermined signals in the first and second circuits.

[0012] Consequently, there is a need for a reconfigurable cell wherein the prior art limitations are avoided or overcome.

Summary of the invention

[0013] It is an object of embodiments of the present invention to provide for a reconfigurable logic circuit having an architecture adapted for offering flexibility while being moderate in area requirements and competitive in terms of throughput. It is a further object to provide a reconfigurable cell on which a tool flow can be applied that accepts regular HDL code to be mapped onto the cell architecture.

[0014] The above objective is accomplished by the solution according to the present invention.

[0015] In a first aspect the invention relates to a reconfigurable logic circuit comprising

- a first, second and third switching circuit arranged for receiving a first input bit, a second input bit and a third input bit, respectively, and each arranged for being configured in a mode wherein the corresponding input bit is passed on or in a mode wherein a fixed logical zero or one is passed on, - a first exclusive OR logic block operable on the outputs of said first, second and third switching circuit and arranged to output a sum bit,

- a fourth, fifth and sixth switching circuit arranged for receiving a fourth input bit, a fifth input bit and a sixth input bit and arranged for being configured in a mode wherein the corresponding input bit is passed on or in a mode wherein a fixed logical zero or one is passed on,

- a first, second and third AND logic block, each arranged for receiving a different pair of the outputs of said fourth, fifth and sixth switching circuit,

- a second exclusive OR logic block operable on the outputs of said first, second and third AND logic block and arranged to produce a carry output bit.

[0016] The proposed solution indeed allows for a lot of flexibility. By providing a switching circuit for each input bit, various logical functions can be implemented. Both the resulting sum bit and the carry output bit can indeed be written as a logical expression containing several bits that can be set to configure a desired logical function.

[0017] In a preferred embodiment at least one of the switching circuits is implemented with an AND logic block arranged for receiving the corresponding input bit and a first configuration bit and a OR logic block arranged for receiving the output of the AND logic block and a second configuration bit. Most preferably all switching circuits of the reconfigurable cell are implemented like that.

[0018] In an advantageous embodiment the first and the fourth switching circuit have their second configuration bit set to a logical 0, the third and sixth switching circuit have their first configuration bit set to a logical 1 and the second and fourth switching circuit have their first configuration bit set to a logical 1 and their second configuration bit set to a logical 0.

[0019] In another preferred embodiment the order of the AND logic block and said OR logic block in the switching circuit is reversed, whereby the output of the OR logic block is arranged to be fed to the AND logic block.

[0020] In embodiments of the invention the switching circuits are configurable for implementing one or more of the following functions : an addition modulo 2 n , an addition modulo 2 or a substitution box.

[0021] In preferred embodiments the switching circuits are arranged to implement a quadratic function. This allows for threshold implementations suitable for protecting the reconfigurable logic circuit against differential power attacks.

[0022] In one aspect the invention relates to a slice comprising one or more reconfigurable logic circuits as previously described. [0023] In embodiments each of the one or more reconfigurable logic circuits of the slice has a corresponding flipflop to which at least either the sum bit or the carry output bit can be applied. The slice further comprises multiplexers.

[0024] Advantageously, the slice comprises exactly four reconfigurable logic circuits as previously described.

[0025] For purposes of summarizing the invention and the advantages achieved over the prior art, certain objects and advantages of the invention have been described herein above. Of course, it is to be understood that not necessarily all such objects or advantages may be achieved in accordance with any particular embodiment of the invention. Thus, for example, those skilled in the art will recognize that the invention may be embodied or carried out in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other objects or advantages as may be taught or suggested herein.

[0026] The above and other aspects of the invention will be apparent from and elucidated with reference to the embodiment(s) described hereinafter.

Brief description of the drawings

[0027] The invention will now be described further, by way of example, with reference to the accompanying drawings, wherein like reference numerals refer to like elements in the various figures.

[0028] Fig.l illustrates a generic scheme of the reconfigurable logic circuit of the invention.

[0029] Fig.2 illustrates an implementation of a switching circuit used for each of the six input bits in Fig.l.

[0030] Fig.3 illustrates a preferred embodiment of the reconfigurable logic circuit of this invention.

[0031] Fig.4 illustrates the switching circuits used in Fig.3 and obtained by giving certain configuration bits a fixed value.

[0032] Fig.5 illustrates an alternative implementation of a switching circuit that can be used for each of the six input bits in Fig.l.

[0033] Fig.6 illustrates an architecture of a slice combining four reconfigurable logic circuits and four flipflops.

[0034] Fig.7 illustrates a tool flow developed to automatically map VFIDL designs onto an array of reconfigurable logic circuits according to the invention.

Detailed description of illustrative embodiments [0035] The present invention will be described with respect to particular embodiments and with reference to certain drawings but the invention is not limited thereto but only by the claims.

[0036] Furthermore, the terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a sequence, either temporally, spatially, in ranking or in any other manner. It is to be understood that the terms so used are interchangeable under appropriate circumstances and that the embodiments of the invention described herein are capable of operation in other sequences than described or illustrated herein.

[0037] It is to be noticed that the term "comprising", used in the claims, should not be interpreted as being restricted to the means listed thereafter; it does not exclude other elements or steps. It is thus to be interpreted as specifying the presence of the stated features, integers, steps or components as referred to, but does not preclude the presence or addition of one or more other features, integers, steps or components, or groups thereof. Thus, the scope of the expression "a device comprising means A and B" should not be limited to devices consisting only of components A and B. It means that with respect to the present invention, the only relevant components of the device are A and B.

[0038] Reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment, but may. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner, as would be apparent to one of ordinary skill in the art from this disclosure, in one or more embodiments.

[0039] Similarly it should be appreciated that in the description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.

[0040] Furthermore, while some embodiments described herein include some but not other features included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention, and form different embodiments, as would be understood by those in the art. For example, in the following claims, any of the claimed embodiments can be used in any combination.

[0041] It should be noted that the use of particular terminology when describing certain features or aspects of the invention should not be taken to imply that the terminology is being re defined herein to be restricted to include any specific characteristics of the features or aspects of the invention with which that terminology is associated.

[0042] In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.

[0043] Envisioning that the next application-specific block to be included on FPGAs will be devoted to cryptography, this invention proposes the design of a new reconfigurable logic circuit conceived specifically for efficiently implementing cryptographic algorithms. In this invention block ciphers are considered, covering various possible constructions (substitution-permutation networks (SPN), addition, rotation and XOR (ARX) based ciphers, Feistel and stream-cipher-like ciphers). Also considered are threshold implementations of block ciphers, which offer side-channel protection. FPGA designers consider cryptography as the next application, observing what happened in processor designs, where, after the basic instructions, designers added in sequence instructions for arithmetic operations (which have been already added to FPGAs) and instructions for signal processing (which have been already added to FPGAs). Instructions for cryptography, however, have not been added to FPGAs yet.

[0044] The proposed fine-grained reconfigurable logic circuit, in this description often also referred to as a reconfigurable cell, is a configurable full-adder-based cell, with a number of configuration bits for programming the functionality. The cell can be configured to implement basic arithmetic logic functions which are then combined to implement certain circuit functionality. The cell structure is designed to easily map the basic transformations present in state-of-the-art block ciphers and is also extremely suitable for implementing algorithmic countermeasures against side-channel analysis, such as threshold implementations.

[0045] The proposed cell can be used as a small, crypto-friendly reconfigurable hardware block to be included as a new type of cell, together with other reconfigurable cells, in a next generation of FPGAs. Another possible application is for example as a small embedded FPGA (eFPGA) to be added to an ASIC design or a microprocessor to maintain and support so-called cryptographic agility, which is a fundamental requirement for the current and future generation of Internet of Things (loT) devices and cyber-physical systems.

[0046] Cryptographic algorithms used to ensure confidentiality fall within one of two categories: private-key (also known as symmetric-key) and public-key. Symmetric-key algorithms use the same key for both encryption and decryption. Conversely, public-key algorithms use a public key for encryption and a private key for decryption. In a typical session, a public-key algorithm is used for the exchange of a session key and to provide authenticity through digital signatures. The session key is then used in conjunction with a symmetric-key algorithm. Symmetric-key algorithms tend to be significantly faster than public-key algorithms and as a result are typically used in bulk data encryption. The two types of symmetric-key algorithms are block ciphers and stream ciphers. Block ciphers operate on a block of data while stream ciphers encrypt individual bits. Block ciphers are typically used when performing bulk data encryption and the data transfer rate of the connection directly follows the throughput of the implemented algorithm.

[0047] To boost the performance of symmetric-key algorithms while maintaining agility for cryptographic algorithms, a configurable cell needs to be designed that is smaller and faster than a LUT and uses less configuration bits. The newly proposed reconfigurable logic circuit should allow existing and future symmetric-key algorithms to be efficiently mapped onto an architecture that comprises an array of the new logic circuits.

[0048] Focus is in the first place on block ciphers. Most block ciphers can be categorized into

SPN-based ciphers, ARX-based ciphers, stream-cipher-like ciphers and Feistel-based ciphers. The most frequently occurring operations in these ciphers are

1. bit permutation,

2. rotation

3. addition modulo 2 n (in ARX-based ciphers),

4. addition modulo 2, i.e. exclusive OR (XOR),

5. substitution box (S-box).

The first two operations in this list are in hardware architectures implemented through routing, while the last three operations require combinatorial logic.

[0049] Further, the threat of side-channel attacks (SCA) should be taken into account. Secret information is thereby extracted through side-channels such as the power consumption, the electromagnetic radiation or the timing behaviour of the chip. Threshold implementations provide a provably secure way to protect a circuit against Differential Power Analysis (DPA) attacks of a specific order. In a threshold implementation the linear parts of a block cipher are repeated according to the number of shares. The non-linear parts are usually expressed in terms of quadratic functions with pipelining registers in between, in order to minimize the number of required shares. Taking threshold implementations into account, a sixth item is added to the list of commonly used operations in block ciphers, namely :

6. quadratic functions (for the construction of threshold implementations of substitution boxes)

[0050] When analyzing the logic needed for the implementation of the listed operations, it turns out that operations 4 to 6 can be expressed in terms of quadratic functions. As an example, the algebraic normal form (ANF) of the function f is given : GF(2) 4 -> GF(2) :

in which the inputs x, y, z and w as well as the coefficients a, and o, j are elements of GF(2), taking two possible values 0 or 1. Both the additions (denoted by ®) and the multiplications in the equation are in GF(2), i.e. the addition is an XOR and the multiplication is a logical AND.

[0051] Operation 3 in the above list of frequent operations is the addition of two n-bit numbers, in which the (n+l) th bit of the sum is omitted. The straightforward way of implementing the addition, is through a ripple-carry adder, comprising a sequence of full adders. A full adder has three inputs (A, B and O h ) and computes a sum output (S) and a carry output (C out ) as follows :

whereby the + operator denotes a logical OR.

[0052] An adequate configurable cell should hence efficiently implement Eqs.(l) and (2). It is further observed that the carry computation in Eq.(2) can be rewritten as a quadratic function in ANF as follows:

C out = AB ø BC in Q AC in .

(3)

Taking this into account, one sees that all terms in Eq.(l) can be generated by full adders, except for the constant term ao. Therefore, it was decided to use the full adder as a basis for the new configurable cell.

[0053] A general scheme of the architecture of the proposed reconfigurable logic circuit is shown in Fig.l. One immediately recognizes on the left hand side a full adder structure with three inputs to determine the sum bit S. This sum circuit computes the sum (S) of the input bits A, B and C. For each of the three input bits a switching circuit is provided. For each input bit two configuration bits determine whether the bit is fed through or absorbed, such that a 0 or a 1 is applied to the circuit. An implementation of such a switching circuit is illustrated in Fig.2. For an input bit in it yields at its output a bit out given by

out = fix + in . fo,x

whereby /o,x and /i ,c denote configuration bits and the '+' operator represents a logical OR.

This gives the following logic table :

Table 1

From the table can easily be seen that in certain cases (i.e. when fax = 1 and fix = 0) the in bit is just passed on, whereas in other cases a fixed logical value is obtained at the switching circuit output. When fix = 1, this fixed value is a logical ' . When both fax = 0 and fix = 0, a fixed logical Ό' is obtained.

The outputs of the three switching circuits are then applied to the XOR block to produce the sum bit S.

[0054] On the right hand side in Fig.l there is also a full adder structure to form the carry circuit that computes the carry-out from the input bits D, E and F. Again there is a switching circuit for each of the three input bits D, E, F. The switching circuits have the same structure as described above. Again there are two configuration bits for each input bit. The outputs of the three switching circuits are pairwise applied to one of the three logical AND gates. The outputs of the AND gates are then fed into the logical XOR block to produce the carry output bit C out .

[0055] The full expressions for the sum bit S and the carry output bit C out for the embodiment of Fig.l are given by

and whereby fi ,A and fo, A denote the two configuration bits in the path of A, fi ,B and fo, B the two configuration bits in the path of input bit B, and so on. The resulting configurable cell has 12 configuration bits. The sum circuit and the carry-out circuit can each be configured to 3 3 functions.

[0056] A preferred embodiment of the reconfigurable logic circuit of the invention is shown in Fig.3. This scheme is derived from the circuit of Fig.l by giving certain configuration bits a predetermined fixed value. In the sum circuit the configuration bit fi ,A is set to equal to 0 and configuration bit fo,c equals a logical 1. In the carry-out circuit the configuration bit fi ,D is set to equal to 0 and configuration bit fo ,F equals a logical 1. Fig.4 shows the resulting switching circuits. In the switching circuits for the input bits B and E the configuration bit fo,x has been set equal to 1 and configuration bit fi ,x equal to 0.

[0057] In the embodiment of Fig.3 the area, the combinatorial delay and the number of configuration bits are optimized. Reducing the number of configuration bits has been done by observing that in Fig.l several combinations of the configuration bits lead to the same function, because the reconfigurable cell is symmetric in both the sum and the carry-out computation. Therefore, it is not necessary to foresee both an AND and an OR gate for each input bit. Providing one input with an AND gate and another one with an OR gate for both the sum and the carry-out circuits leads to a reduction of the number of configuration bits as well as a reduction in the logical delay and the area of the cell. This way, the number of configuration bits is reduced from 12 to 4. The eight functions that can be obtained, are given in the following Table 2 :

Table 2

in which X, XY, X+Y and ®T denote an inversion, a logical AND, a logical OR and an XOR, respectively.

Whereas the embodiment of Fig.3 only has a slightly more limited functionality than the first, it yields a clear advantage over the implementation of Fig.l in terms of area and combinatorial delay. [0058] An alternative implementation of the switching circuits of Fig.2 is shown in Fig.5. The order of the AND logic block and OR logic block has been reversed compared to the implementation of Fig.2. The output of the OR logic block now forms an input to the logic AND block. For an input bit in the switching circuit then yields at its output a bit out given by

out = (in + fix) . f 0 ,x

whereby /o,x and /i,c denote the two configuration bits and the '+' and operators represent a logical OR and AND, respectively. This expression gives rise to the logic table of Table 3 :

Table 3

As before, in certain cases (i.e. when /o , x = 1 and f i X = 0 in Fig.5) the in bit is just passed on, whereas in other cases a fixed logical value is obtained at the switching circuit output. In order to obtain the preferred embodiment of Fig.3, in the sum circuit the configuration bit fi ,A is set to equal to 0 and configuration bit fo,c equals a logical 1. In the carry-out circuit the configuration bit fi ,D is set to equal to 0 and configuration bit fo, F equals a logical 1. In the switching circuits for the input bits B and E the configuration bit fo,x has been set equal to 1 and configuration bit fi ,x equal to 0.

[0059] The skilled person will readily understand that the switching circuits as shown in Fig.2 or Fig.5 may equally well be implemented with other logic circuitry, for example using logic NOR and/or logic NAND blocks as building blocks.

[0060] In order to be able to reuse the routing capabilities of commercial FPGA design tools, the reconfigurable cell is integrated into a slice in combination with flipflops and multiplexers. The resulting slice is shown in Fig.6. Each cell has an accompanying flipflop, which can be connected to either the 5 or the C out output of the cell. The combination of the multiplexer with the flipflop is implemented as a scan-flipflop. A slice has four configuration bits for each reconfigurable cell and one configuration bit for each multiplexer, which results in 24 configuration bits per slice.

[0061] The tool flow developed to automatically map VFIDL designs onto an array of reconfigurable logic circuits, is depicted in Fig.7 and comprises three steps: modify the VHDL description such that all S-boxes are a composition of quadratic functions, synthesize the resulting VHDL design into a netlist that consists of standard cells from a tailored library,

translate the netlist into a configurable netlist with reconfigurable logic cells and a configuration bit stream to be applied to the array of logic circuits.

[0062] Since the reconfigurable logic cell is especially suitable for the implementation of quadratic functions, the first step in the proposed tool flow translates all S-boxes into VHDL descriptions consisting of quadratic functions. This also holds for threshold implementations, in which pipelining registers are needed in between quadratic functions. Pipelining registers bound the propagation of glitches that could contain exploitable side-channel information and, consequently, reduce the number of required shares. In ARX-based designs, no preprocessing is needed, since the non-linear operation, i.e. the addition modulo 2 n , is automatically translated into a ripple-carry adder (comprising full adders) in the next step, discussed below.

[0063] In the synthesis step the design is mapped onto an array of configurable logic cells using an ASIC synthesis tool. The functions listed in the above shown Table 2 are used to start from. A standard cell library is defined that contains these eight functions. Most existing standard cell libraries contain at least six of these eight functions. Only the A ® B ® C and DE + (D + E)F = DE © DF © EF functions are possibly not present in all standard cell libraries. In this case the standard cells that are not present, are added with the given functionality to the library, and all gates that are not in Table 2 are removed, except for the full adder gate and the D-flipflop. Since the eight functions in the table as well as the full adder are eventually mapped onto the gates of the reconfigurable cell, they all have the same area and delay in the resulting configurable array. Therefore, the area and the delay of these gates are modified in the library according to the values for the embodiment of the reconfigurable cell shown in Fig.3.

[0064] The outcome is a netlist containing the eight gates in Table 2, a full adder gate and a

D-flipflop. Since the four functions in the top part of Table 2 are independent of the four functions in the bottom part of the table, it is straightforward to merge any top-part function with any bottom- part function into one reconfigurable cell. However, inside a slice of reconfigurable cells, only one of the outputs can be connected to a flipflop, which is taken into account during the merge. The 24 configuration bits for each slice are combined into a configuration bit stream. This way, the output of this third step is a configurable netlist, i.e. a netlist consisting of only slices, and a configuration bit stream.

[0065] Because the slice has an interface that is similar to the interface of a Xilinx slice, the

Xilinx tools for placement and routing can be re-used to transform the netlist of cFA slices into a placed and routed design. Therefore, the performance of the proposed architecture can be evaluated by mapping a hardware design to both the architecture of the reconfigurable cells and a Xilinx FPGA, comparing the resources and delay of the slices only, excluding routing. For the evaluated block ciphers, the proposed architecture results in a drastic reduction of the configurable resources and the number of configuration bits, while the delay (i.e. the critical path) is comparable. A comparison to Altera FPGAs gives similar results.

[0066] Operations like addition modulo 2 n , addition modulo 2, substitution box and quadratic functions, for which the proposed configurable cell is designed, are also common in hash functions, authenticated encryption algorithms, public-key algorithms based on binary (extension) field arithmetic and in error-correcting codes. Therefore, these algorithms can efficiently be mapped onto the proposed architecture as well.

[0067] While the invention has been illustrated and described in detail in the drawings and foregoing description, such illustration and description are to be considered illustrative or exemplary and not restrictive. The foregoing description details certain embodiments of the invention. It will be appreciated, however, that no matter how detailed the foregoing appears in text, the invention may be practiced in many ways. The invention is not limited to the disclosed embodiments.

[0068] Other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a study of the drawings, the disclosure and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the indefinite article "a" or "an" does not exclude a plurality. A single processor or other unit may fulfil the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage. A computer program may be stored/distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems. Any reference signs in the claims should not be construed as limiting the scope.