Proposal of PingPong-128 Countermeasure against Power Analysis Attack

被引:0
|
作者
Kang, Young-Jin [1 ]
Kim, Ki-Hwan [1 ]
Lee, Hoon Jae [2 ]
机构
[1] Dongseo Univ, Dept Ubiquitous IT, Busan 47011, South Korea
[2] Dongseo Univ, Div Comp Engn, Busan 47011, South Korea
基金
新加坡国家研究基金会;
关键词
Power Analysis Attack; PingPong-128; Stream Cipher; Scrambler; PA Countermeasures;
D O I
10.23919/icact.2019.8702026
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Typical power analysis attack countermeasures include the ability to inject defensive logic during the hardware gate design phase, or to add additional hardware logic or software coding depending on how the cryptographic module is configured. For example, the Hardware-based high speed cryptographic module via FPGA can be protected with a gate array logic, and the firmware cryptographic module via the microprocessor module will allow you to implement defence technology with software coding. In this paper, Using Scrambler to propose a secure PingPong-128 crypto algorithm for power analysis attacks.
引用
收藏
页码:431 / 434
页数:4
相关论文
共 50 条
  • [31] An Extremely Light-Weight Countermeasure to Power Analysis Attack in Dedicated Circuit for AES
    Koyanagi, Yui
    Ukezono, Tomoaki
    [J]. 2022 19TH INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2022, : 85 - 86
  • [32] A countermeasure against differential power analysis based on random delay insertion
    Bucci, M
    Luzzi, R
    Guglielmo, M
    Trifiletti, A
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 3547 - 3550
  • [33] Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis
    Nakatsu, Daisuke
    Li, Yang
    Sakiyama, Kazuo
    Ohta, Kazuo
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 258 - 272
  • [34] A practical countermeasure against address-bit differential power analysis
    Itoh, K
    Izu, T
    Takenaka, M
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 382 - 396
  • [35] Manipulative Attack Against Physical Layer Key Agreement and Countermeasure
    Jin, Rong
    Zeng, Kai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 475 - 489
  • [36] Function Masking: A New Countermeasure Against Side Channel Attack
    Kim, Taesung
    Ahn, Sungjun
    Lee, Seungkwang
    Choi, Dooho
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 331 - 342
  • [37] Frequency of Occurrence Analysis Attack and its Countermeasure
    Por, Lip Yee
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (02) : 189 - 197
  • [38] Invertibility attack against watermarking based on forged algorithm and a countermeasure
    Zhang, XP
    Wang, SZ
    [J]. PATTERN RECOGNITION LETTERS, 2004, 25 (08) : 967 - 973
  • [39] Countermeasure against fingerprinting attack in Tor by separated contents retrieval
    Okazaki, Naonobu
    Toyoda, Kentaroh
    Yokoyama, Emiri
    So, Hirofumi
    Katayama, Tetsuro
    Park, Mirang
    [J]. IEICE COMMUNICATIONS EXPRESS, 2015, 4 (12): : 370 - 375
  • [40] AES power attack based on induced cache miss and countermeasure
    Bertoni, G
    Zaccaria, V
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 586 - 591