Asynchronous Cryptographic System: Side channel attacks through differential power analysis (DPA)

被引:0
|
作者
Kim, Yeon-Ho [1 ]
Lee, Sang-Jin [1 ]
Kim, Kyu-Kwan [1 ]
You, Young-Gap [1 ]
Cho, Kyoung-Rok [1 ]
Cho, Tae-Won [1 ]
Eshraghian, Kamran [1 ]
机构
[1] Chungbuk Natl Univ, Coll Elect & Comp Engn, WCU Program, Cheongju 361763, Chungbuk, South Korea
关键词
Asynchronous; ARIA; Side channel attack; DPA; GALS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Improving cryptographic system security and integrity against side channel attacks have attracted significant attention by researcher during the last two decades. This paper presents Globally Asynchronous Locally Synchronous (GALS) based block cryptographic algorithm as part of a approach in the design of an asynchronous cryptographic system in order to safe guard against Differential Power analysis (DPA) side channel attacks [1]. DPA is an attack method which identifies the cipher key by increasing the correlation between the data processed by cipher key and its power consumption. Asynchronous cryptographic module is operated by data signal regardless of clock. Asynchronous design is suitable for cryptographic module due to its low power consumption and immunity from side channel attack.
引用
收藏
页码:39 / 42
页数:4
相关论文
共 50 条
  • [41] Secure implementation of cryptographic modules: Development of a standard evaluation environment for side channel attacks
    Satoh, Akashi
    Katashita, Toshihiro
    Sakane, Hirofumi
    Synthesiology, 2010, 3 (01): : 55 - 65
  • [42] Satisfiability-based framework for enabling side-channel attacks on cryptographic software
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    2006 DESIGN AUTOMATION AND TEST IN EUROPE, VOLS 1-3, PROCEEDINGS, 2006, : 1353 - +
  • [43] Power Side Channel Attacks: Where Are We Standing?
    Taouil, Mottaqiallah
    Aljuffri, Abdullah
    Hamdioui, Said
    2021 16TH INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2021), 2021,
  • [44] Wireless Charging Power Side-Channel Attacks
    La Cour, Alexander S.
    Afridi, Khurram K.
    Suh, G. Edward
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665
  • [45] Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits
    Alioto, Massimo
    Giancane, Luca
    Scotti, Giuseppe
    Trifiletti, Alessandro
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2010, 57 (02) : 355 - 367
  • [46] AES-based cryptographic and biometric security coprocessor IC in 0.18-μm CMOS resistant to side-channel power analysis attacks
    Tiri, K
    Hwang, DD
    Hodjat, A
    Lai, BC
    Yang, SL
    Schaumont, P
    Verbauwhede, I
    2005 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS, 2005, : 216 - 219
  • [47] Better Side-Channel Attacks Through Measurements
    Singh, Alok K.
    Gerdes, Ryan M.
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 15 - 26
  • [48] Leakage-power analysis ENABLES ATTACKS on cryptographic devices
    Jovanovic, Milena
    EDN, 2009, 54 (10) : 23 - 26
  • [49] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 61 - 77
  • [50] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID SECURITY AND PRIVACY, 2012, 7055 : 61 - 77