Asynchronous Cryptographic System: Side channel attacks through differential power analysis (DPA)

被引:0
|
作者
Kim, Yeon-Ho [1 ]
Lee, Sang-Jin [1 ]
Kim, Kyu-Kwan [1 ]
You, Young-Gap [1 ]
Cho, Kyoung-Rok [1 ]
Cho, Tae-Won [1 ]
Eshraghian, Kamran [1 ]
机构
[1] Chungbuk Natl Univ, Coll Elect & Comp Engn, WCU Program, Cheongju 361763, Chungbuk, South Korea
关键词
Asynchronous; ARIA; Side channel attack; DPA; GALS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Improving cryptographic system security and integrity against side channel attacks have attracted significant attention by researcher during the last two decades. This paper presents Globally Asynchronous Locally Synchronous (GALS) based block cryptographic algorithm as part of a approach in the design of an asynchronous cryptographic system in order to safe guard against Differential Power analysis (DPA) side channel attacks [1]. DPA is an attack method which identifies the cipher key by increasing the correlation between the data processed by cipher key and its power consumption. Asynchronous cryptographic module is operated by data signal regardless of clock. Asynchronous design is suitable for cryptographic module due to its low power consumption and immunity from side channel attack.
引用
收藏
页码:39 / 42
页数:4
相关论文
共 50 条
  • [21] A Data Augmentation Method for Side-Channel Attacks on Cryptographic Integrated Circuits
    Cui, Xiaotong
    Zhang, Hongxin
    Xu, Jun
    Fang, Xing
    Ning, Wenxu
    Wang, Yuanzhen
    Hosen, Md Sabbir
    ELECTRONICS, 2024, 13 (07)
  • [22] The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) : 1320 - 1333
  • [23] On-Chip Protection of Cryptographic ICs Against Physical Side Channel Attacks
    Nagata, Makoto
    2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2019,
  • [24] Side-channel cryptographic attacks using pseudo-boolean optimization
    Oren, Yossef
    Wool, Avishai
    CONSTRAINTS, 2016, 21 (04) : 616 - 645
  • [25] Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
    Bhasin, Shivam
    Guilley, Sylvain
    Sauvage, Laurent
    Danger, Jean-Luc
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 195 - 207
  • [26] Differential power analysis for cryptographic ICs
    Chu Jie
    Zhao Qiang
    Ding Guoliang
    Deng Gaoming
    ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL IV, 2007, : 292 - 295
  • [27] Electromagnetic Analysis and Attacks System for Cryptographic RFID
    Zhu, Zhihui
    Liu, Wei
    Li, Xiangyu
    Wu, Liji
    Zhang, Xiangming
    2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT-2012), 2012, : 544 - 546
  • [28] Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms
    Alioto, Massimo
    Poll, Massimo
    Rocchi, Santina
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (03) : 226 - 239
  • [29] Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
    Renauld, Mathieu
    Standaert, Francois-Xavier
    Veyrat-Charvillon, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 97 - 111
  • [30] Cryptographic Algorithms on the GA144 Asynchronous Multi-Core ProcessorImplementation and Side-Channel Analysis
    Tobias Schneider
    Ingo von Maurich
    Tim Güneysu
    David Oswald
    Journal of Signal Processing Systems, 2014, 77 : 151 - 167