19 tayangan

Judul Asli: A Flip-Flop for the DPA Resistant Three-Phase Dual-Rail

Diunggah oleh Sethu George

- Lect4 Stick Diagram
- CMOS Inverter: DC Analysis
- VLSI Circuits Power Estimation.pdf
- Rr310401 Digital Ic Applications
- Analysis & Design of low Power Dynamic latched Double-Tail Comparator
- Class 02 Transistors I – details
- Chapter8 Slides
- MATLAB MANUAL1
- Doc 5364
- lecture3b
- VL5101 Periodical 1
- clase c
- calII
- d 41022328
- Novel Low Power Low Voltage Full Adder Cell
- Max 235
- ELEX-Digital-Electronics.pdf
- Experiment No 3
- p2231tf Sony Vaio
- 20130119163341103

Anda di halaman 1dari 5

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 11, NOVEMBER 2012

A Flip-Flop for the DPA Resistant Three-Phase Dual-Rail Pre-Charge Logic Family

Marco Bucci, Luca Giancane, Raimondo Luzzi, and Alessandro Triletti

AbstractThis paper investigates the design of a data ip-op compatible with the three-phase dual-rail pre-charge logic (TDPL) family. TDPL is a differential power analysis (DPA) resistant dual-rail logic style whose power consumption is insensitive to unbalanced load conditions, based on a three phase operation where, in order to obtain a constant energy consumption, an additional discharge phase is performed after pre-charge and evaluation. In this work, the TDPL basic gates operation is shortly summarized and the TDPL ip-op implementation is reported. A part of an encryption algorithm is used as case a study to prove the effectiveness of the proposed circuit. Simulation results in a 65 nm CMOS process show an improvement in the energy consumption balancing in excess of 10 times with respect to the state of the art. Index TermsDifferential power analysis (DPA), dual-rail logic, security, sense amplier-based logic (SABL), three-phase dual-rail pre-charge logic (TDPL).

I. INTRODUCTION Side channel attacks can disclose condential data (i.e., cryptographic keys and user PINs) looking at the information leaked by the hardware implementation of cryptographic algorithms. In particular differential power analysis (DPA) exploits the fact that digital circuits feature a power consumption prole dependent on the processed data: even small correlations between the circuit switching activity and the key material can be revealed by measuring the current consumption over repeated computations [1]. Since the introduction of DPA, several countermeasures have been proposed in the technical literature at different levels from system to transistor-level. The transistor-level approach is based on the adoption of a logic style whose power consumption is constant or independent of the processed data. In a dual-rail pre-charge (DRP) logic style (e.g., sense amplier-based logic (SABL) [2], wave dynamic differential logic (WDDL) [3], dual-spacer DRP [4]), signals are spatially encoded as two complementary wires and power consumption is constant under the assumption that the differential outputs of each gate drive the same capacitive load. Dual-rail pre-charge logics are not affected by glitches but building two balanced wires requires a full-custom approach thus increasing design and maintenance costs. Semi-custom design ows supporting differential logic families have been proposed in the technical literature [5] but the proposed balanced routing technique does not take into account the dependence of the capacitive load on a line on the logic state of the adjacent wires and introduces additional constraints for the routing tool. In addition, in a modern deep sub-micron technology, local process gradients cannot be

Manuscript received October 15, 2010; revised March 15, 2011 and June 21, 2011; accepted August 01, 2011. Date of publication October 06, 2011; date of current version July 27, 2012. M. Bucci and R. Luzzi are with Inneon Technologies AG, Babenbergerstrasse 10, A-8020 Graz, Austria (e-mail: marco.bucci@inneon.com; raimondo.luzzi@inneon.com). L. Giancane and A. Triletti are with the Department of Electronic Engineering, University of Rome La Sapienza, Rome I-00184, Italy (e-mail: giancane@die.uniroma1.it; triletti@die.uniroma1.it). Digital Object Identier 10.1109/TVLSI.2011.2165862

neglected and they are the limiting factor for the load matching accuracy. A second technique proposed in [6][8] is based on a masked dualrail pre-charge logic style (MDPL) and on an improved implementation (iMDPL) where, due to the random masking at the gate level, power consumption is randomized. The iMDPL solves the problems of the MDPL due to the synchronization of the inputs but the penalty with respect MDPL is a factor of 3 and 1.5 in terms of area and power consumption, respectively. A third solution has been reported in [9]: a logic insensitive to unbalanced routing capacitances is obtained by introducing a three-phase dual-rail pre-charge logic (TDPL) with an additional discharge phase where the output which is still high after the evaluation phase is discharged as well. Since both outputs are pre-charged to VDD and discharged to VSS , a TDPL gate shows a constant energy consumption over its operating cycle. The main drawback of this solution is the additional area for the routing of the three control signals. A single-ended version of TDPL has been also proposed which shows a lower overhead in terms of power consumption and area thus being suitable for embedded and mobile applications [10]. While in [9] only a basic set of logic gates is reported, this paper is devoted to the implementation of a data ip-op compatible with TDPL gates. The TDPL operating principle is shortly summarized in Section II where simulation results in the adopted technology are also reported for both TDPL and SABL basic gates. The ip-op implementation details and simulation results are presented in Section III. Finally, a case study is discussed in Section IV and an extensive comparison with the corresponding SABL implementation is carried out. II. TDPL LOGIC STYLE In the TDPL, during a rst phase (pre-charge), the output lines of a generic logic gate are both charged to VDD , then (second phase-evaluation) the proper line is discharged to VSS according to the input data, thus generating a new output data. Finally, during the last phase (discharge), the other line is discharged too. As a consequence, since both wires are pre-charged to VDD and discharged to VSS , a TDPL logic gate shows a constant energy consumption over its operating cycle (independent of the input data), even if unbalanced capacitive loads to VDD and/or VSS are taken into account. In [9], the proposed logic style has been implemented as an enhancement of the SABL logic style with a minimum increase in the required area. Therefore, as in [9], SABL cells are assumed as the benchmark for the equivalent TDPL cells in this work. For instance, a TDPL inverter is shown in Fig. 1 and the timing diagram corresponding to the circuit operation [9] is depicted in Fig. 2. Notice that TDPL, like SABL, is a Domino Logic and, therefore, CMOS static inverters must be inserted between two cascaded gates. This means that the inputs to a logic gate are both low at the beginning of the evaluation phase (outputs of the driving gate are pre-charged to VDD ) and one of them goes high when the driving gate evaluates, thus triggering the evaluation of the gate under analysis. The duration of the evaluation phase limits the length of the combinatorial paths (i.e., number of cascaded gates between two ip-ops). The three control signals are derived from a base clock and they must be routed as clock signals, keeping their skew under control. The current consumption prole of the TDPL inverter has been reported in [9], where each operation phase can be identied. A basic set of cells, obtained by changing the pull-down logic, has been designed in a 65-nm CMOS process. A 1.2 V supply voltage and a

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 11, NOVEMBER 2012

2129

deviation (NSD), E . As expected, SABL gates are sensitive to unbalanced load conditions (NED 25% NSD 12%) thus conrming that a balanced routing must be necessary employed to obtain a constant energy consumption. Vice versa, TDPL cells show an ex2% NSD 1%) tremely balanced energy consumption (NED in spite of unbalanced load capacitances. As expected, almost a doubling of the mean energy per cycle must be taken into account since both output lines are discharged in each cycle. On the contrary, the penalty in terms of silicon area is minimal (16% for the NAND/AND), especially if compared with what is reported for MDPL [7]. With respect to SABL, TDPL requires the routing of two additional signals (charge discharge). However, if at least four metal layers are available for signal routing, an increase in silicon area is not expected, especially in regular structures such as data-paths. Notice that MDPL is affected by a similar drawback due to the routing of the random data for masking.

=E

>

>

< ;

<

Fig. 1. TDPL inverter.

100 MHz operating frequency are adopted. Each transistor is designed = 0.12 m and the minimum gate length = 65 nm with a width is assumed. Simulations are done in Spectre, using BSIM4 transistor models. In order to simulate the cells in a real operating condition, a testbench has been dened where each input to the gate under analysis is driven by a TDPL inverter and unbalanced load capacitances to V DD V DD ) and V SS V SS ) are assumed on the DD ( out SS ( out out out output lines ( out). Typical values for the local routing parasitic capacitances in a standard-cell semi-custom layout are used V DD = 8 fF V DD = 1 fF V SS = 4 fF V SS = 3 fF). The ( out out out out same testbench, with SABL inverters on the inputs, has been used to simulate the corresponding SABL cells. In both cases, only the current consumption of the gate under analysis is taken into account and every input data transition is simulated. T As in [2], the energy per cycle = DD 1 0 DD ( ) is adopted as gure of merit to measure the resistance against power analysis attacks. The obtained results for the three analyzed gates (Inverter, NAND/AND and XOR/NXOR) have been compared with respect to the difference 1E = (max( ) 0 min( )), the normalized energy deviation (NED), dened as 1E max( ), and the normalized standard

V C C

;C out; ;C

V C ;C ;C

The implementation of a data ip-op compatible with TDPL gates is based on the scheme shown in Fig. 3: it includes a rst TDPL inverter, an intermediate circuit which drives the set reset inputs to a CMOS SR-latch and a second TDPL inverter on the output. Its operation is similar to the SABL ip-op reported in [2] where the additional circuitry after the rst TDPL inverter avoids the latch invalid input (set = reset = 0) by forcing a logic-1 during both the phases of discharge and charge. In other words, the input TDPL inverter with the additional circuitry on its outputs behaves as a SABL inverter. The timing diagram is equal shown in Fig. 4 claries the ip-op operation where 3 to negated and discharge3 charge are the discharge and charge signals referred to eval . Therefore, as discharge charge are active 3 when eval = 0, discharge3 , charge are active when eval = 0. With reference to Fig. 4, on the eval falling edge, the input inverter enters its evaluation phase and node1 is set to . Further changes of the input data during the evaluation phase do not affect node1 . Transistors 1 3 are closed ( 2 4 are open) and the CMOS SR-latch is either set or reset depending on node1 thus storing the input data (node2 ). Meanwhile, the output inverter is in the discharge and charge phases thus being insensitive to its inputs. When the input inverter enters its discharge phase (on the eval raising edge), 1 and 3 are open and 2 4 are closed thus forcing the hold state of the SR-latch (set = reset = 1). Hereafter, changes on node1 due to the discharge/charge phase in the rst invert do not affect node2 . The output inverter enters its evaluation phase thus setting according to node2 . Ultimately, the value assumed by the output during the evaluation phase on the eval raising edge is equal to the value taken by the input during the evaluation phase on the previous raising edge according to the master-slave operation.

eval

eval n n

N ;N

P ;P N

P ;P

Q eval

;C

IV. CASE STUDY As a case study, the circuit shown in Fig. 5 has been simulated. It includes two 4-bit input registers (data_i, key_i), four XOR gates, the S-box 0 from the Serpent algorithm [11] and a 4-bit output register (data_o). Both the combinatorial logic and the registers have been implemented in TDPL using the proposed ip-op, where the clock signal clk is applied to the eval input in Fig. 3 and the other control signals are not shown. As a reference, the same circuit has been implemented in SABL as well. In order to take into account the unbalanced routing in a semi-custom layout, every gate output is loaded with unbalanced load capacitances to DD and SS . In details, the asserted lines are loaded with 4 and 1.5 fF to DD and SS , respectively, while 0.5 and 1 fF have

E V E E

I t dt

2130

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 11, NOVEMBER 2012

Fig. 4. Flip-op operation. Fig. 6. SABL: superimposition of the power supply current traces.

been used for the negated lines. These are reasonable parasitic capacitance values for the local routing in the adopted technology. A superimposition of the power supply current traces IDD (t) for every possible transition of the input data is depicted in Figs. 6 and 7 for the SABL and the TDPL implementation respectively. In both

cases, each operation phase can be identied in the supply current prole: the SABL circuit shows a data dependency during both pre-charge and evaluation (rst and second peak in Fig. 6) while, in the TDPL implementation, the pre-charge current pulse is constant (second peak in Fig. 7) and a data dependency is visible during the discharge and evaluation phases (rst and third peak). In addition, the TDPL circuit shows a fourth current peak due to the ip-op operation (charging of node1 in Fig. 3) which is also constant with respect to the input data. A histogram of the observed energies per cycle for every possible input transition is reported in Fig. 8 and it shows that TDPL guarantees a balanced energy consumption, independent of the processed data, even in presence of unbalanced interconnections. Notice that the same scale has been used for the energy per cycle. The obtained simulation results are summarized in Table I for both SABL and TDPL, where the energy consumption has been evaluated

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 11, NOVEMBER 2012

2131

Fig. 7. TDPL: superimposition of the power supply current trances. Fig. 9. Transient standard deviation of the power supply current traces.

Fig. 10. Differential traces of all 16 key guesses for TDPL implementation. Fig. 8. Case studyenergy consumption per cycle: (a) SABL versus (b) TDPL.

on both the clock cycles necessary to process the input data. These results conrm that, as for the single logic gates, TDPL shows an extremely balanced energy consumption per cycle in spite of unbalanced semi-custom routing. In comparison to SABL, the simulated values for both NED and NSD are more than 10 times smaller for the TDPL implementation.

The standard deviation of the power supply current traces for both implementations is shown in Fig. 9. This gure of merit allows to better asses the DPA resistivity in case the attacker is supposed to use a measurement equipment able to discriminate each current consumption peak inside the operating cycle [12][14]. Notice that, in the case study under analysis, a bandwidth larger than 1 GHz would be necessary for the measurement channel, neglecting the low-pass ltering due to the parasitics of the on-chip power grid. Fig. 9 conrms that the pre-charge peak in TDPL is data-independent, as well as the fourth peak introduced by the ip-ops. Moreover, the data dependency of the remaining peaks is noticeably reduced in comparison to SABL. Finally, a complete DPA has been performed on both implementations using the 256 simulated power supply current traces IDD (t) for every possible transition of the input data. One of the S-box outputs is used as target bit. The obtained differential traces of all 16 key guesses are shown in Figs. 10 and 11 for TDPL and SABL respectively. The amplitude of the trace corresponding to the correct key (black line) is the highest in both cases thus resulting in a successful DPA attack (maximum peak of 8.342 and 14.88 A, respectively). However, while for the SABL case, the trace of the correct key is clearly distinguishable

2132

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 11, NOVEMBER 2012

Fig. 11. Differential traces of all 16 key guesses for SABL implementation.

(9.643 A maximum peak for an incorrect key), for the TDPL implementation, it is only marginally higher than the other ones (7.524 A maximum peak for an incorrect key). From these simulation results, it follows that TDPL shows a smaller remaining leakage compared to SABL but it can be hardly evaluated if it would be sufcient for a successful attack on a real circuit, where the current traces are affected by measuring errors, noise and ltering effects. As a nal remark, it is worth notice that the early propagation effect [15] represents a further source of information leakage due to the pulldown network in both logic styles. In order to minimize this effect, the enhanced differential pull-down network (DPDN) introduced for SABL [16], can be applied to TDPL as well.

V. CONCLUSION A ip-op compatible with the DPA-resistant logic family TDPL has been introduced and compared to the state of the art in the technical literature. From the performed experimental results on a case study in a 65-nm CMOS process, it follows that the proposed implementation shows a constant energy consumption even in presence of asymmetric interconnections. The simulated energy consumption per cycle shows an improvement in the energy consumption balancing in excess of 10 times with respect to the corresponding SABL implementation without requiring any constraint on the geometry of the complementary wires. The analysis of the instantaneous current consumption proles and a complete DPA performed on the simulated current traces conrm the improvement obtained with the proposed logic family.

[5] K. Tiri and I. Verbauwhede, Place and route for secure standard cell design, in Proc. Smart Card Res. Adv. Appl. IFIP Conf. (CARDIS), 2004, pp. 143158. [6] T. Popp and S. Mangard, Masked dual-rail pre-charge logic: DPA-resistance without routing constraints, in Proc. Workshop Cryptograph. Hardw. Embed. Syst. (CHES), 2005, pp. 172186. [7] T. Popp and S. Mangard, Implementation aspects of the DPA-resistant logic style MDPL, in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), 2006, pp. 29132916. [8] T. Popp, M. Kirschbaum, T. Zefferer, and S. Mangard, Evaluation of the masked logic style MDPL on a prototype chip, in Proc. Workshop Cryptograph. Hardw. Embed. Syst. (CHES), 2007, pp. 8194. [9] M. Bucci, L. Giancane, R. Luzzi, and A. Triletti, Three-phase dualrail pre-charge logic, in Proc. Workshop Cryptograph. Hardw. Embed. Syst. (CHES), 2006, pp. 232241. [10] E. Menendez and K. Mai, A high-performance, low-overhead, poweranalysis-resistant, single-rail logic style, in Proc. IEEE Int. Workshop Hardw.-Oriented Security Trust (HOST), 2008, pp. 3336. [11] R. Anderson, E. Biham, and L. Knudsen, Serpent: A Proposal for the Advanced Encryption Standard, NIST AES proposal, 1998. [Online]. Available: http://www.cl.cam.ac.uk/ftp/users/ria14/serpent.pdf [12] F. Regazzoni, T. Eisenbarth, A. Poschmann, J. Groschdl, F. Gurkaynak, M. Macchetti, Z. Toprak, L. Pozzi, C. Paar, Y. Leblebici, and P. Ienne, Evaluating resistance of MCML technology to power analysis attacks using a simulation-based methodology, Trans. Computation. Sci. IV, vol. 5430, pp. 230243, 2009. [13] K. J. Kulikowski, M. Su, A. Smirnov, A. Taubin, M. G. Karpovsky, and D. MacDonald, Delay insensitive encoding and power analysis: A balancing act, in Proc. 11th IEEE Int. Symp. Asynch. Circuits Syst. (ASYNC), 2005, pp. 116125. [14] K. J. Lin, S. C. Fang, S. H. Yang, and C. C. Lo, Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware, in Proc. Conf. Exhib. Design, Autom. Test Euro. (DATE), 2007, pp. 16. [15] K. J. Kulikowski, M. G. Karpovsky, and A. Taubin, Power attacks on secure hardware based on early propagation of data, in Proc. 12th IEEE Int. On-Line Test. Symp., 2006, pp. 131138. [16] K. Tiri and I. Verbauwhede, Design method for constant power consumption of differential logic circuits, in Proc. Conf. Exhib. Design, Autom., Test Euro. (DATE), 2005, pp. 628633.

REFERENCES

[1] P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, in Proc. Adv. Cryptol. (CRYPTO), 1999, pp. 388397. [2] K. Tiri, M. Akmal, and I. Verbauwhede, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, in Proc. IEEE 28th Euro. Solid-State Circuit Conf. (ESSCIRC), 2002, pp. 403406. [3] K. Tiri and I. Verbauwhede, A logic design methodology for a secure DPA resistant ASIC or FPGA implementation, in Proc. Design, Autom., Test Euro. Conf. Expo. (DATE), 2004, pp. 246251. [4] D. Sokolov, J. Murphy, A. Bystrov, and A. Yakovlev, Improving the security of dual-rail circuits, in Proc. Workshop Cryptograph. Hardw. Embed. Syst. (CHES), 2004, pp. 282297.

- Lect4 Stick DiagramDiunggah olehmanicks369601
- CMOS Inverter: DC AnalysisDiunggah olehsreekanthreddy peram
- VLSI Circuits Power Estimation.pdfDiunggah olehkiwangog
- Rr310401 Digital Ic ApplicationsDiunggah olehSrinivasa Rao G
- Analysis & Design of low Power Dynamic latched Double-Tail ComparatorDiunggah olehIJSTE
- Class 02 Transistors I – detailsDiunggah olehkumaranraj
- Chapter8 SlidesDiunggah olehrandomname112
- MATLAB MANUAL1Diunggah olehRichard Brooks
- Doc 5364Diunggah olehmaster_abhishek
- lecture3bDiunggah olehAnurag Laddha
- VL5101 Periodical 1Diunggah olehDarwin
- clase cDiunggah olehJose David Castro
- calIIDiunggah olehSanjeev K. Sharma
- d 41022328Diunggah olehAnonymous 7VPPkWS8O
- Novel Low Power Low Voltage Full Adder CellDiunggah olehPavan Pakki
- Max 235Diunggah olehmarian_mm12345
- ELEX-Digital-Electronics.pdfDiunggah olehJustine Mira
- Experiment No 3Diunggah olehAko C Sean
- p2231tf Sony VaioDiunggah olehangel14864
- 20130119163341103Diunggah olehbassumudhol
- CMOS Fabrication Process.docxDiunggah olehJohnMatthewBancil
- An Octo Coding Technique to Reduce Energy TransitionDiunggah olehInternational Journal of Research in Engineering and Technology
- 05966256Diunggah olehSUMANTH DONGARI
- OJS_fileDiunggah oleh陳泓昇
- 01004017Diunggah olehpepe890305
- CMOS Ch1.4 Pass TransistorsDiunggah olehJacques Ha
- Training 211Diunggah olehAbhigovardhan
- Annesure IIDiunggah olehMoez Ul Hassan
- 01)-2UP_3Diunggah olehasadraza123
- 74ls175Diunggah olehEddy Diaz

- IR-Drop in on-Chip Power Distribution NetworksDiunggah olehSethu George
- Integrated Energy-Harvesting Photodiodes WithDiunggah olehSethu George
- Glitch-Free NAND-Based Digitally ControlledDiunggah olehSethu George
- Design of Digit-Serial FIR Filters Algorithms,Diunggah olehSethu George
- Computing Two-Pattern Test Cubes for TransitionDiunggah olehSethu George
- Constant Delay Logic StyleDiunggah olehSethu George
- A High Speed Low Power CAM With a Parity Bit AndDiunggah olehSethu George
- A Fast-Response Pseudo-PWM Buck Converter WithDiunggah olehSethu George
- A Compact Clock Generator for Heterogeneous GALSDiunggah olehSethu George
- A Colpitts CMOS Quadrature VCO Using DirectDiunggah olehSethu George
- 10-Bit 30-MSs SAR ADC Using a SwitchbackDiunggah olehSethu George

- An intro to Java programmingDiunggah olehFlaviusMihesan
- Aplus Essentials Exam CramDiunggah olehBms Ag
- LAB OAI4 AcropolisDiunggah olehSarthak Kalani
- Electronic News GatheringDiunggah olehamirq4
- Sun SVM vs VxVM Feature ComparisonDiunggah olehrutherfc
- Project ReportDiunggah olehGarima Chadha
- CCNA LABDiunggah olehrupiyachaser
- Week 8 Lecture MaterialDiunggah olehanurag sawarn
- Data Types and Data StructuresDiunggah olehPrashant Jain
- E LearningDiunggah olehMdAnjum1991
- Data Design Tutorial 8Diunggah olehSACHIN H. DHAMAPURKAR
- CCNA - ACLDiunggah olehSumit Kalaria
- APM_LinuxDiunggah olehPeio Gil
- Mitre Cloud SOADiunggah olehAdomas Svirskas
- bsagDiunggah olehPrathamesh Nitore
- GECOLDiunggah olehKhan Azmat
- Kuote With Source Code - FinalDiunggah olehkylemhall
- Huawei ELTE Broadband Access ProductsDiunggah olehLakshmi Kiran
- TechSupport_ ITIL Foundation Interview QuestionsDiunggah olehDeepak Jaiswal
- SampleDiunggah olehmypermatakoe71
- S7 SoftPLC ManualDiunggah olehManuel Luque
- CCNA Lab ManualDiunggah olehFaarah Adam
- WUG_Uvod Do AzureDiunggah olehkkuppachi
- DH61SA ProductGuide02 EnglishDiunggah olehhumbertantoni
- Fedora 12 Deployment Guide en USDiunggah olehOriden053
- Vb.net TutorialDiunggah olehpulkit
- SSH User GuideDiunggah olehdoshivinod
- Wire Shark DebugDiunggah olehAnonymous GEyA5Ir
- Sixth sense technology seminar reportDiunggah olehPrarthana Wahi
- 24985798 the Astrological Self InstructorDiunggah olehParameshwaran Shanmugasundharam