An Anti-Power Attacks Implementation of AES Algorithm in ASIC

被引:0
|
作者
Yu, Siyang [1 ]
Li, Kenli [1 ]
Qin, Yunchuan [1 ]
Tang, Shaohua [2 ]
机构
[1] Hunan Univ, Sch Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[2] S China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510641, Guangdong, Peoples R China
关键词
AES; power analysis; mask; combination logic;
D O I
10.1109/HPCC.and.EUC.2013.231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we apply a protective strategy to the AES encryption algorithm. In order to reduce power consumption and correlation in the process of arithmetic operations, we change the trigger number and location in the hardware implementation by modifying the structure of the algorithm. Through the simulation platform, our Advanced Encryption Standard algorithm can effectively resist the Differential Power Analysis and Correlation power analysis. Compared with the mask and dynamic differential logic, the policy doesn't increase the complexity of the algorithm and the area.
引用
收藏
页码:1640 / 1646
页数:7
相关论文
共 50 条
  • [41] Successful Implementation of AES Algorithm in Hardware
    Borhan, Rozita
    Aziz, Raja Mohd Fuad Tengku
    IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS DESIGN, SYSTEMS AND APPLICATIONS (ICEDSA 2012), 2012, : 27 - 32
  • [42] Reversible Logic Implementation of AES Algorithm
    Datta, Kamalika
    Shrivastav, Vishal
    Sengupta, Indranil
    Rahaman, Hafizur
    2013 8TH INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS), 2013, : 140 - 144
  • [43] A high speed ASIC implementation of the Rijndael algorithm
    Sever, R
    Ismailoglu, AN
    Tekmen, YC
    Askar, M
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 2, PROCEEDINGS, 2004, : 541 - 544
  • [44] OFDM channel estimation algorithm and ASIC implementation
    Haene, S.
    Burg, A.
    Felber, N.
    Fichtner, W.
    ECCSC 08: 4TH EUROPEAN CONFERENCE ON CIRCUITS AND SYSTEMS FOR COMMUNICATIONS, 2008, : 270 - +
  • [45] An efficient ASIC Implementation of QARMA Lightweight Algorithm
    Zhao, Conghui
    Yan, Yingjian
    Li, Wei
    2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2019,
  • [46] Correlation Photonic Emission Attacks Against AES Algorithm
    Wang, Hong-sheng
    Xu, Zi-yan
    Zhang, Yang
    Chen, Kai-yan
    Wu, Ling-an
    PROCEEDINGS OF THE 2016 5TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE, 2016, 80 : 512 - 517
  • [47] Power equalization of AES FPGA implementation
    Strachacki, M.
    Szczepanski, S.
    BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2010, 58 (01) : 125 - 128
  • [48] Deep Learning-based Attacks on Masked AES Implementation
    Daehyeon, Bae
    Hwang, Jongbae
    Ha, Jaecheol
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (04): : 897 - 902
  • [49] An Efficient AES Implementation against Timing Attacks Based on SoC
    Wang, Rui-jiao
    Zhang, Lu-guo
    Zheng, Bin
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 357 - 360
  • [50] Elections, power and anti-power in the Democratic Republic of the Congo (1960-2019): The vote of the "invisible"
    Reyes Lugardo, Marco Antonio
    ESTUDIOS DE ASIA Y AFRICA, 2020, 55 (03) : 507 - 541