Proposal of PingPong-128 Countermeasure against Power Analysis Attack

被引:0
|
作者
Kang, Young-Jin [1 ]
Kim, Ki-Hwan [1 ]
Lee, Hoon Jae [2 ]
机构
[1] Dongseo Univ, Dept Ubiquitous IT, Busan 47011, South Korea
[2] Dongseo Univ, Div Comp Engn, Busan 47011, South Korea
基金
新加坡国家研究基金会;
关键词
Power Analysis Attack; PingPong-128; Stream Cipher; Scrambler; PA Countermeasures;
D O I
10.23919/icact.2019.8702026
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Typical power analysis attack countermeasures include the ability to inject defensive logic during the hardware gate design phase, or to add additional hardware logic or software coding depending on how the cryptographic module is configured. For example, the Hardware-based high speed cryptographic module via FPGA can be protected with a gate array logic, and the firmware cryptographic module via the microprocessor module will allow you to implement defence technology with software coding. In this paper, Using Scrambler to propose a secure PingPong-128 crypto algorithm for power analysis attacks.
引用
收藏
页码:431 / 434
页数:4
相关论文
共 50 条
  • [1] Correlation Power Analysis Attack on the PingPong-128 Key Stream Generator
    Kang, Young-Jin
    Kim, Hyun Ho
    Bruce, Ndibanje
    Park, YoungGoo
    Lee, HoonJae
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 506 - 509
  • [2] An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing
    Choudhury, Amlan Jyoti
    Lim, Hyotaek
    Lee, Hoon-Jae
    [J]. 2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 695 - 700
  • [3] FPGA Implementation of PingPong-128 Stream Cipher for Ubiquitous Application
    Choudhury, Amlan Jyoti
    Lim, Hyotaek
    Lee, Hoon Jae
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 627 - 630
  • [4] Countermeasure of TWINE against Power Analysis Attack
    Nozaki, Yusuke
    Asahi, Kensaku
    Yoshikawa, Masaya
    [J]. 2015 IEEE INTERNATIONAL MEETING FOR FUTURE OF ELECTRON DEVICES, KANSAI (IMFEDK), 2015,
  • [5] An Efficient Hardware Countermeasure against Differential Power Analysis Attack
    Choudhury, Amlan Jyoti
    Park, Beum Su
    Bruce, Ndibanje
    Lee, Young Sil
    Lim, Hyotaek
    Lee, Hoon Jae
    [J]. CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 153 - +
  • [6] CALPAN: Countermeasure against Leakage Power Analysis Attack by Normalized DDPL
    Padmini, C.
    Ravindra, J. V. R.
    [J]. PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [7] A Wavelet-based Power Analysis Attack against Random Delay Countermeasure
    Dong, Xiaofei
    Zhang, Fan
    Queshi, Samiya
    Zhang, Yiran
    Liang, Ziyuan
    Yang, Bolin
    Gao, Feng
    [J]. PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2018, : 19 - 24
  • [8] Correlation Power Analysis on KASUMI: Attack and Countermeasure
    Gupta, Devansh
    Tripathy, Somanath
    Mazumdar, Bodhisatwa
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 142 - 156
  • [9] Bus-Invert Coding as a Low-Power Countermeasure Against Correlation Power Analysis Attack
    Vosoughi, M. Ali
    Wang, Longfei
    Kose, Selcuk
    [J]. 2019 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM LEVEL INTERCONNECT PREDICTION (SLIP), 2019,
  • [10] Implementation of a decoupling based power analysis attack countermeasure
    Mayhew, Matthew
    Muresan, Radu
    [J]. IET CIRCUITS DEVICES & SYSTEMS, 2016, 10 (06) : 528 - 535