Secure AES hardware module for resource constrained devices

被引:0
|
作者
Trichina, E [1 ]
Korkishko, T [1 ]
机构
[1] Univ Kuopio, Dept Comp Sci, FIN-70211 Kuopio, Finland
来源
关键词
POWER ANALYSIS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices ' resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an AES algorithm that provides complete protection against first order differential power analysis by embedding a data masking countermeasure at a hardware level. We concentrate on inversion in GF(2(8)) since this is the only non-linear operation that requires complex transformations on masked data and on bits of the masks. The simulation and synthesis results confirm that the proposed solution is suitable for applications in GSM and ad-hoc networks in terms of performance, gate count and power consumption. To our knowledge, this is the first implementation of a side channel-resistant AES hardware module suitable for smart- and SIM-cards.
引用
收藏
页码:215 / 229
页数:15
相关论文
共 50 条
  • [1] Configurable Secure ECC Hardware Module or Resource Constrained Device
    Xu, Qian
    Zhou, Yujie
    Mao, Junfa
    2009 ASIA PACIFIC CONFERENCE ON POSTGRADUATE RESEARCH IN MICROELECTRONICS AND ELECTRONICS (PRIMEASIA 2009), 2009, : 424 - 427
  • [2] A Hardware and Secure Pseudorandom Generator for Constrained Devices
    Bakiri, Mohammed
    Guyeux, Christophe
    Couchot, Jean-Francois
    Marangio, Luigi
    Galatolo, Stefano
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3754 - 3765
  • [3] A Secure Authentication Mechanism for Resource Constrained Devices
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [4] AES-8: A Lightweight AES for Resource-Constrained IoT Devices
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    Kumar, Vinod
    Gupta, Sachin Kumar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (03):
  • [5] Approximate CNN Hardware Accelerators for Resource Constrained Devices
    Thejaswini, P.
    Suresh, Gautham
    Chiraag, V.
    Nandi, Sukumar
    IEEE ACCESS, 2025, 13 : 12542 - 12553
  • [6] Lightweight secure group communications for resource constrained devices
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    Youssef, Habib
    Zemmari, Akka
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (04) : 187 - 200
  • [7] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [8] Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices
    Sensaoui, Abderrahmane
    Hely, David
    Aktouf, Oum-El-Kheir
    2019 15TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2019), 2019, : 31 - 38
  • [9] Neural architecture search for resource constrained hardware devices: A survey
    Yang, Yongjia
    Zhan, Jinyu
    Jiang, Wei
    Jiang, Yucheng
    Yu, Antai
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2023, 8 (03) : 149 - 159
  • [10] A lightweight secure data transmission protocol for resource constrained devices
    Yu, Qian
    Zhang, Chang N.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (05) : 362 - 370