Strengthened of AES Encryption Algorithms within New Logic Topology

Publish Year: 1397
نوع سند: مقاله ژورنالی
زبان: English
View: 124

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_MJEE-12-1_011

تاریخ نمایه سازی: 25 بهمن 1401

Abstract:

Side-channel attacks are considered to be the most important problems of modern digital security systems. Today, Differential Power Attack (DPA) is one of the most powerful tools for attacking hardware encryption algorithms in order to discover the correct key of the system. In this work, a new scheme based on randomizing power consumption of a fixed-operation logic gate is proposed. The goal of this method is enhancing the immunity of AES algorithm against DPA. Having a novel topology to randomize the power consumption of each Exclusive-NOR gate, the proposed circuit causes random changes in the overall power consumption of the steps of the algorithm; thus, the correlation between the instantaneous power consumption and the correct key is decreased and the immunity of the AES implementations which the key is injected into their process through Exclusive-NOR gates is extremely increased. The proposed method can be used as a general hardening method in the majority of cryptographic algorithms. The results of theoretical analysis and simulations in ۹۰-nm technology demonstrate the capability of the proposed circuits to strengthen AES against DPA. The CMOS area and power consumption overhead is less than ۱%.

Keywords:

Advanced Encryption Standard (AES) , Differential Power Analysis (DPA) , Power Analysis (PA)- Power Measurement , AND OR Invert (AOI) , OR AND Invert (OAI)

Authors

Vahid Rashtchi

Department of Electrical and Computer Engineering, Zanjan University, Zanjan, Iran

Seyyed Hamidreza Mousavi

Department of Electrical and Computer Engineering, Zanjan University, Zanjan, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Katz J, Lindell Y. “Introduction to modern cryptography,” CRC press; ...
  • T. Messerges, E. Dabbish, and R. Sloan, “Examining smart-card security ...
  • Biryukov A, Daemen J, Lucks S, Vaudenay S. Topics and ...
  • Y. Zhang, L. Yang, and J. Chen, “RFID and Sensor ...
  • W. Rankl and W. Effing, Smart Card Handbook. New York, ...
  • K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart ...
  • P. C. Kocher, J. Jaffe, and B. Jun, “Differential power ...
  • K. Wu, H. Li, T. Chen, and F. Yu, “Electromagnetic ...
  • B. Gammel, H. Bock, and M. Goessel, “Cryptographic unit and ...
  • J.-S. Coron and L. Goubin, “On Boolean and arithmetic masking ...
  • H. Qu, J. Xu, and Y. Yan, “A random delay ...
  • K. H. Boey, Y. Lu, M. O’Neill, and R. Woods, ...
  • M. Joye, P. Paillier, and B. Schoenmakers, “On second-order differential ...
  • K. Tiri, M. Akmal, and I. Verbauwhede, “A dynamic and ...
  • K. Tiri and I. Verbauwhede, “A logic level design methodology ...
  • D. Hwang et al., “AES-based security coprocessor IC in ۰.۱۸-μm ...
  • C. Tokunaga and D. Blaauw, “Securing encryption systems with a ...
  • D. Kamel, M. Renauld, D. Bol, F.-X. Standaert, and D. ...
  • S. Mangard, “Masked dual-rail pre-charge logic: DPA-resistance without routing constraints,” ...
  • T. Popp, M. Kirschbaum, T. Zefferer, and S. Mangard, “Evaluation ...
  • Clavier C, Coron JS, Dabbous N. "Differential power analysis in ...
  • Lu Y, O'Neill MP, McCanny JV. "FPGA implementation and analysis ...
  • Guilley S, Sauvage L, Flament F, Vong VN, Hoogvorst P, ...
  • Messerges TS. Using second-order power analysis to attack DPA resistant ...
  • Mangard S. Hardware countermeasures against DPA-a statistical analysis of their ...
  • J. J. A. Fournier, S. Moore, H. Li, R. Mullins, ...
  • K. Tiri, D. Hwang, A. Hodjat, B. C. Lai, S. ...
  • Verbauwhede, Ingrid M., and Kris JV Tiri. "Dynamic and differential ...
  • Bucci M, Giancane L, Luzzi R, Trifiletti A. Three-phase dual-rail ...
  • Dichtl M, Golić JD. “High-speed true random number generation with ...
  • T.S. Messerges, E. Dabbish, and R. Sloan, “Investigations of Power ...
  • Popp T, Mangard S. “Masked dual-rail pre-charge logic: DPA-resistance without ...
  • Suzuki D, Saeki M, Ichikawa T. “Random Switching Logic: A ...
  • Fish A, Avital M, Dagan H, Keren O, “Inventors; Bar-Ilan ...
  • Lumbiarres-Lopez R, Lopez-Garcia M, Canto-Navarro E. “Hardware architecture implemented on ...
  • Moradi A, Poschmann A. “Lightweight Cryptography and DPA Countermeasures: A ...
  • Tuyls P, Hollmann HD, Van Lint JH, Tolhuizen LM. “XOR-based ...
  • Liu PC, Chang HC, Lee CY. A low overhead DPA ...
  • Taur Y, Ning TH. "Fundamentals of modern VLSI devices,” Cambridge ...
  • Attaran, A. and Mirhassani, M., ۲۰۱۵, July. An embedded low-"overhead ...
  • C. Tokunaga, D. Blaauw, “Secure AES engine with a local ...
  • M. Doulcier-Verdier, et al., “A side-channel and fault-attack resistant AES ...
  • نمایش کامل مراجع