Secure AES hardware module for resource constrained devices

被引:0
|
作者
Trichina, E [1 ]
Korkishko, T [1 ]
机构
[1] Univ Kuopio, Dept Comp Sci, FIN-70211 Kuopio, Finland
来源
关键词
POWER ANALYSIS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices ' resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an AES algorithm that provides complete protection against first order differential power analysis by embedding a data masking countermeasure at a hardware level. We concentrate on inversion in GF(2(8)) since this is the only non-linear operation that requires complex transformations on masked data and on bits of the masks. The simulation and synthesis results confirm that the proposed solution is suitable for applications in GSM and ad-hoc networks in terms of performance, gate count and power consumption. To our knowledge, this is the first implementation of a side channel-resistant AES hardware module suitable for smart- and SIM-cards.
引用
收藏
页码:215 / 229
页数:15
相关论文
共 50 条
  • [41] Harmonic-NAS: Hardware-Aware Multimodal Neural Architecture Search on Resource-constrained Devices
    Ghebriout, Mohamed Imed Eddine
    Bouzidi, Halima
    Niar, Smail
    Ouarnoughi, Hamza
    ASIAN CONFERENCE ON MACHINE LEARNING, VOL 222, 2023, 222
  • [42] Secure patient data transmission on resource constrained platform
    Ifrah Afzal
    Shabir A. Parah
    Nasir N Hurrah
    O.Y. Song
    Multimedia Tools and Applications, 2024, 83 : 15001 - 15026
  • [43] Secure Ownership Transfer for Resource Constrained IoT Infrastructures
    Gunnarsson, Martin
    Gehrmann, Christian
    INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2020, 2022, 1545 : 22 - 47
  • [44] Secure patient data transmission on resource constrained platform
    Afzal, Ifrah
    Parah, Shabir A.
    Hurrah, Nasir N.
    Song, O. Y.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (05) : 15001 - 15026
  • [45] Correction to: AES Hardware Accelerator on FPGA with Improved Throughput and Resource Efficiency
    Manjith Baby Chellam
    Ramasubramanian Natarajan
    Arabian Journal for Science and Engineering, 2019, 44 : 2861 - 2861
  • [46] A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT
    Beatriz Orue, Amalia
    Hernandez Encinas, Luis
    Fernandez, Veronica
    Montoya, Fausto
    INTERNATIONAL JOINT CONFERENCE SOCO'17- CISIS'17-ICEUTE'17 PROCEEDINGS, 2018, 649 : 672 - 682
  • [47] Validation of IoT secure communication gateway for constrained devices
    Peniak, Peter
    Bubenikova, Emilia
    2019 24TH INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2019, : 117 - 121
  • [48] An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
    Pasupuleti, Syam Kumar
    Ramalingam, Subramanian
    Buyya, Rajkumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 64 : 12 - 22
  • [49] Adaptive Precision Training for Resource Constrained Devices
    Huang, Tian
    Luo, Tao
    Zhou, Joey Tianyi
    2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 1403 - 1408
  • [50] Coherent Caesar Cipher for Resource Constrained Devices
    Verma, Priya
    Gaba, Gurjot Singh
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 327 - 335