An Anti-Power Attacks Implementation of AES Algorithm in ASIC

被引:0
|
作者
Yu, Siyang [1 ]
Li, Kenli [1 ]
Qin, Yunchuan [1 ]
Tang, Shaohua [2 ]
机构
[1] Hunan Univ, Sch Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[2] S China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510641, Guangdong, Peoples R China
关键词
AES; power analysis; mask; combination logic;
D O I
10.1109/HPCC.and.EUC.2013.231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we apply a protective strategy to the AES encryption algorithm. In order to reduce power consumption and correlation in the process of arithmetic operations, we change the trigger number and location in the hardware implementation by modifying the structure of the algorithm. Through the simulation platform, our Advanced Encryption Standard algorithm can effectively resist the Differential Power Analysis and Correlation power analysis. Compared with the mask and dynamic differential logic, the policy doesn't increase the complexity of the algorithm and the area.
引用
收藏
页码:1640 / 1646
页数:7
相关论文
共 50 条
  • [21] A Weighted Statistical Analysis of DPA Attack on an ASIC AES Implementation
    Qian, Guoyu
    Zhou, Ying
    Xing, Yueying
    Fan, Yibo
    Tsunoo, Yukiyasu
    Goto, Satoshi
    2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, : 906 - +
  • [22] VLSI implementation of an AES algorithm resistant to differential power analysis attack
    Zhao, Jia
    Han, Jun
    Zeng, Xiaoyang
    Chen, Jun
    ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 838 - 841
  • [23] A novel ASIC implementation of RSA algorithm
    Zhu, KJ
    Xu, K
    Wang, Y
    Min, H
    2003 5TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2003, : 1300 - 1303
  • [24] ASIC implementation for multilevel filter algorithm
    Institute for Pattern Recognition and AI, Huazhong Univ. of Sci. and Technol., Wuhan 430074, China
    Huazhong Ligong Daxue Xuebao, 2006, 2 (4-7):
  • [25] Implementation on MicroBlaze of AES Algorithm to Reveal Fake Keys Against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    2014 IEEE 23RD INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2014, : 1882 - 1887
  • [26] A Survey on Various Cryptanalytic Attacks on the AES Algorithm
    Zodpe, Harshali
    Shaikh, Arbaz
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (02): : 115 - 123
  • [27] Low Power ECC Implementation on ASIC
    Van-Lan Dao
    Van-Tinh Nguyen
    Van-Phuc Hoang
    ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 538 : 332 - 339
  • [28] Software Implementation of AES-128: Side Channel Attacks Based on Power Traces Decomposition
    Hu, Fanliang
    Ni, Feng
    2022 INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS), 2022, : 14 - 21
  • [29] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285
  • [30] Cache based power analysis attacks on AES
    Fournier, Jacques
    Tunstall, Michael
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 17 - 28