Asynchronous Cryptographic System: Side channel attacks through differential power analysis (DPA)

被引:0
|
作者
Kim, Yeon-Ho [1 ]
Lee, Sang-Jin [1 ]
Kim, Kyu-Kwan [1 ]
You, Young-Gap [1 ]
Cho, Kyoung-Rok [1 ]
Cho, Tae-Won [1 ]
Eshraghian, Kamran [1 ]
机构
[1] Chungbuk Natl Univ, Coll Elect & Comp Engn, WCU Program, Cheongju 361763, Chungbuk, South Korea
关键词
Asynchronous; ARIA; Side channel attack; DPA; GALS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Improving cryptographic system security and integrity against side channel attacks have attracted significant attention by researcher during the last two decades. This paper presents Globally Asynchronous Locally Synchronous (GALS) based block cryptographic algorithm as part of a approach in the design of an asynchronous cryptographic system in order to safe guard against Differential Power analysis (DPA) side channel attacks [1]. DPA is an attack method which identifies the cipher key by increasing the correlation between the data processed by cipher key and its power consumption. Asynchronous cryptographic module is operated by data signal regardless of clock. Asynchronous design is suitable for cryptographic module due to its low power consumption and immunity from side channel attack.
引用
收藏
页码:39 / 42
页数:4
相关论文
共 50 条
  • [31] Enhancing power analysis attacks against cryptographic devices
    Bucci, M.
    Giancane, L.
    Luzzi, R.
    Marino, M.
    Scotti, G.
    Trifiletti, A.
    IET CIRCUITS DEVICES & SYSTEMS, 2008, 2 (03) : 298 - 305
  • [32] Patents in power analysis attacks and their countermeasures for cryptographic devices
    Muresan R.
    Recent Patents on Electrical Engineering, 2010, 3 (03) : 177 - 185
  • [33] Vulnerability modeling of cryptographic hardware to power analysis attacks
    Moradi, Amir
    Salmasizadeh, Mahmoud
    Shalmani, Mohammad Taghi Manzuri
    Eisenbarth, Thomas
    INTEGRATION-THE VLSI JOURNAL, 2009, 42 (04) : 468 - 478
  • [34] On Side-Channel Analysis of Memristive Cryptographic Circuits
    Chen, Li-Wei
    Chen, Ziang
    Schindler, Werner
    Zhao, Xianyue
    Schmidt, Heidemarie
    Du, Nan
    Polian, Ilia
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 463 - 476
  • [35] Enhancing power analysis attacks against cryptographic devices
    Bucci, M.
    Giancane, L.
    Luzzi, R.
    Scotti, G.
    Trifiletti, A.
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 2905 - 2908
  • [36] Cryptographic Coprocessor with Modular Architecture for Research and Development of Countermeasures Against Power-Based Side-Channel Attacks
    Korona, Mateusz
    Wojciechowski, Tomasz
    Rawski, Mariusz
    Tomaszewicz, Pawel
    PROCEEDINGS OF THE 2019 26TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (MIXDES 2019), 2019, : 190 - 195
  • [37] Analysis of Countermeasures Against Remote and Local Power Side Channel Attacks using Correlation Power Analysis
    Mozipo A.T.
    Acken J.M.
    IEEE Trans. Dependable Secure Comput., 2024, 6 (5128-5142): : 1 - 15
  • [38] Design and Implementation of a Reconfigurable Cryptographic Coprocessor with Multiple Side-Channel Attacks Countermeasures
    Shang, Xinchao
    Shan, Weiwei
    Liu, Xinning
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (11)
  • [39] Defense against Side-Channel Power Analysis Attacks on Microelectronic Systems
    Sundaresan, Vijay
    Rammohan, Srividhya
    Vemuri, Ranga
    NAECON 2008 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2008, : 144 - 150
  • [40] On-Board Decoupling of Cryptographic FPGA to Improve Tolerance to Side-Channel Attacks
    Iokibe, Kengo
    Amano, Tetsuo
    Toyota, Yoshitaka
    2011 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2011, : 925 - 930