Secure AES hardware module for resource constrained devices

被引:0
|
作者
Trichina, E [1 ]
Korkishko, T [1 ]
机构
[1] Univ Kuopio, Dept Comp Sci, FIN-70211 Kuopio, Finland
来源
关键词
POWER ANALYSIS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices ' resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an AES algorithm that provides complete protection against first order differential power analysis by embedding a data masking countermeasure at a hardware level. We concentrate on inversion in GF(2(8)) since this is the only non-linear operation that requires complex transformations on masked data and on bits of the masks. The simulation and synthesis results confirm that the proposed solution is suitable for applications in GSM and ad-hoc networks in terms of performance, gate count and power consumption. To our knowledge, this is the first implementation of a side channel-resistant AES hardware module suitable for smart- and SIM-cards.
引用
收藏
页码:215 / 229
页数:15
相关论文
共 50 条
  • [21] A Secure Channel Establishment Method on A Hardware Security Module
    Kim, Daewon
    Jeon, Yongsung
    Kim, Jeongnyeo
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 555 - 556
  • [22] Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices
    Karati, Arijit
    Fan, Chun-I
    Hsu, Ruei-Hau
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10431 - 10440
  • [23] Resilient and Secure Hardware Devices Using ASL
    Alasad, Qutaiba
    Lin, Jie
    Yuan, Jiann-Shuin
    Fan, Deliang
    Awad, Amro
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (02)
  • [24] Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices
    Thapar, Sapna
    Mishra, Deepak
    Saini, Ravikant
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (01) : 411 - 420
  • [25] X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
    Liberati, Edoardo
    Visintin, Alessandro
    Lazzeretti, Riccardo
    Conti, Mauro
    Uluagac, Selcuk
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 183 - 210
  • [26] Cognitive Secure Shield - A Machine Learning enabled threat shield for resource constrained IoT Devices
    Vuppalapati, Jaya Shankar
    Kedari, Santosh
    Ilapakurti, Anitha
    Vuppalapati, Chandrasekar
    Chauhan, Chitanshu
    Mamidi, Vanaja
    Rautji, Surbhi
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1073 - 1080
  • [27] AES Hardware Accelerator on FPGA with Improved Throughput and Resource Efficiency
    Manjith, Baby Chellam
    Ramasubramanian, Natarajan
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 6873 - 6890
  • [28] AES Hardware Accelerator on FPGA with Improved Throughput and Resource Efficiency
    Manjith Baby Chellam
    Ramasubramanian Natarajan
    Arabian Journal for Science and Engineering, 2018, 43 : 6873 - 6890
  • [29] Edge analytics on resource constrained devices
    Savitz, Sean
    Perera, Charith
    Rana, Omer
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2023, 26 (05) : 513 - 527
  • [30] Lightweight Cryptography for Resource Constrained Devices
    Shraddha, B. H.
    Kinnal, Bhagyashree
    Wali, Heera
    Iyer, Nalini C.
    Vishal, P.
    HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 553 - 564