Toward secured IoT devices: a shuffled 8-bit AES hardware implementation

被引:0
|
作者
Harcha, Ghita [1 ]
Lapotre, Vianney [1 ]
Chavet, Cyrille [1 ]
Coussy, Philippe [1 ]
机构
[1] Univ Bretagne Sud, Lab STICC, UMR 6285, Lorient, France
关键词
security; SCA; shuffling; HW design; AES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present a lightweight secured AES hardware implementation designed to further resist to Side Channel Attacks relying on Power Analysis. The proposed architecture is based on an 8-bit data-path, and the protection is provided by shuffling computations and memory locations. Our shuffling module is based on a permutation network controlled by a Random Number Generator and leads to the best compromise between security, area, and performances compared to state-of-the-art Implementation results on a spartan-6 FPGA show that the proposed protection mechanisms impact the area and the timing performance of the unprotected design by factors of 1.58 and 0.35 respectively. Security evaluation based on simulation results shows that the proposed secure architecture resists to a regular CPA by revealing a unique key byte when attacking with up to 1 million traces while state-of-the-art shuffled designs requires only 50000 traces to retrieve the entire secret key. Considering an integrated CPA (also called windowing attack), the proposed architecture allows increasing up to x300 the required number oftraces (Measurements to Disclosure) to retrieve 40% of the key bytes and reveals no more than 9 key bytes when attacking with up to 1 million traces.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Efficient integrated AES crypto-processor architecture for 8-bit stream cipher
    Ahmad, N.
    Hasan, S. M. Rezaul
    ELECTRONICS LETTERS, 2012, 48 (23) : 1456 - 1457
  • [42] 8-bit serialised architecture of SEED block cipher for constrained devices
    Pirpilidis, Filippos
    Pyrgas, Lampros
    Kitsos, Paris
    IET CIRCUITS DEVICES & SYSTEMS, 2020, 14 (03) : 316 - 321
  • [43] Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers
    Kim, Hyunjun
    Sim, Minjoo
    Eum, Siwoo
    Jang, Kyungbae
    Song, Gyeongju
    Kim, Hyunji
    Kwon, Hyeokdong
    Lee, Wai-Kong
    Seo, Hwajeong
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 171 - 182
  • [44] Design and Implementation of 8-Bit Vedic Multiplier Using CMOS Logic
    Deodhe, Yeshwant
    Kakde, Sandeep
    Deshmukh, Rushikesh
    2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 340 - 344
  • [45] 8-BIT FLASH CONVERTER CHIP - MORE THAN 4 6-BIT DEVICES
    GOODENOUGH, F
    ELECTRONIC DESIGN, 1982, 30 (17) : 37 - 38
  • [46] SCA-Resistant GCM Implementation on 8-Bit AVR Microcontrollers
    Seo, Seog Chung
    Kim, Heeseok
    IEEE ACCESS, 2019, 7 : 103961 - 103978
  • [47] IMPLEMENTATION OF MULTIBYTE FLOATING POINT ARITHMETIC IN 8-BIT MICROPROCESSOR.
    Dutta, Uma
    Bhattacharya, Debjani
    Sarma, A.Das
    Mechanical engineering bulletin, 1986, 17 (03): : 104 - 113
  • [48] HASH MD5 Function Implementation at 8-bit Microcontroller
    Aziz, Mochamad Vicky Ghani
    Wijaya, Rifki
    Prihatmanto, Ary Setijadi
    Henriyan, Diotra
    PROCEEDINGS OF THE 2013 JOINT INTERNATIONAL CONFERENCE ON RURAL INFORMATION & COMMUNICATION TECHNOLOGY AND ELECTRIC-VEHICLE TECHNOLOGY (RICT & ICEV-T), 2013,
  • [49] Design and Implementation of 8-bit Vedic Multiplier using mGDI Technique
    Meti, Shashank S.
    Bharath, C. N.
    Kumar, Praveen Y. G.
    Kariyappa, B. S.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1923 - 1927
  • [50] Efficient Implementation of 8-bit Vedic Multipliers for Image Processing Application
    Vijayan, Aravind E.
    John, Arlene
    Sen, Deepak
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 544 - 549