Asynchronous Cryptographic System: Side channel attacks through differential power analysis (DPA)

被引:0
|
作者
Kim, Yeon-Ho [1 ]
Lee, Sang-Jin [1 ]
Kim, Kyu-Kwan [1 ]
You, Young-Gap [1 ]
Cho, Kyoung-Rok [1 ]
Cho, Tae-Won [1 ]
Eshraghian, Kamran [1 ]
机构
[1] Chungbuk Natl Univ, Coll Elect & Comp Engn, WCU Program, Cheongju 361763, Chungbuk, South Korea
关键词
Asynchronous; ARIA; Side channel attack; DPA; GALS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Improving cryptographic system security and integrity against side channel attacks have attracted significant attention by researcher during the last two decades. This paper presents Globally Asynchronous Locally Synchronous (GALS) based block cryptographic algorithm as part of a approach in the design of an asynchronous cryptographic system in order to safe guard against Differential Power analysis (DPA) side channel attacks [1]. DPA is an attack method which identifies the cipher key by increasing the correlation between the data processed by cipher key and its power consumption. Asynchronous cryptographic module is operated by data signal regardless of clock. Asynchronous design is suitable for cryptographic module due to its low power consumption and immunity from side channel attack.
引用
收藏
页码:39 / 42
页数:4
相关论文
共 50 条
  • [1] Power Analysis Attacks to Cryptographic Circuits: a Comparative Analysis of DPA and CPA
    Alioto, Massimo
    Poli, Massimo
    Rocchi, Santina
    2008 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2008, : 333 - 336
  • [2] Power Current Modeling of Cryptographic VLSI Circuits for Analysis of Side Channel Attacks
    Nagata, Makoto
    Fujimoto, Daisuke
    Tanaka, Daichi
    2013 ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2013,
  • [3] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
    Luo, Pei
    Zhang, Liwei
    Fei, Yunsi
    Ding, A. Adam
    PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
  • [4] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [5] RRAM Motifs for Mitigating Differential Power Analysis Attacks (DPA)
    Khedkar, Ganesh
    Kudithipudi, Dhireesha
    2012 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2012, : 88 - 93
  • [6] Differential Power Analysis (DPA) Attack on Dual Field ECC Processor for Cryptographic Applications
    Suresh, Sam J.
    Manjushree, A.
    Eswaran, P.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [7] Countermeasure for cryptographic chips to resist side-channel attacks
    Zhang, Tao
    Fan, Ming-Yu
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (11): : 2990 - 2998
  • [8] Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (04) : 465 - 470
  • [9] Differential side channel analysis attacks on FPGA implementations of ARIA
    Kim, ChangKyun
    Schlaeffer, Martin
    Moon, SangJae
    ETRI JOURNAL, 2008, 30 (02) : 315 - 325
  • [10] Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
    Bogdanov, Andrey
    Kizhvatov, Ilya
    IEEE TRANSACTIONS ON COMPUTERS, 2012, 61 (08) : 1153 - 1164