Scrambler Based AES for Countermeasure Against Power Analysis Attacks

被引:0
|
作者
Kang, Young-Jin [1 ]
Kim, Ki-Hwan [1 ]
Lee, HoonJae [2 ]
机构
[1] Dongseo Univ, Dept Ubiquitous IT, Busan 47011, South Korea
[2] Dongseo Univ, Div Comp Engn, Busan 47011, South Korea
基金
新加坡国家研究基金会;
关键词
Power analysis attacks; Scramble; AES; Side-channel attacks;
D O I
10.1007/978-981-32-9244-4_21
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In modern society, cryptographic algorithms that guarantee the integrity of data have been used in various fields while being secured through various research. However, since the encryption algorithms are mostly used in the computer environment, there is a difference in the amount of leakage current depending on all calculation results. A power analysis attack is a method that utilizes a difference in leakage current and is effective in attack of a cryptographic algorithm. Therefore, we propose the structure of AES encryption algorithm to cope with power analysis attack by randomizing input using scrambler so that attacker cannot input arbitrary initial value and secret key.
引用
收藏
页码:152 / 157
页数:6
相关论文
共 50 条
  • [31] Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks
    Barbu, Guillaume
    Battistello, Alberto
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 153 - 168
  • [32] A cluster-based countermeasure against blackhole attacks in MANETs
    Fei Shi
    Weijie Liu
    Dongxu Jin
    Jooseok Song
    Telecommunication Systems, 2014, 57 : 119 - 136
  • [33] A cluster-based countermeasure against blackhole attacks in MANETs
    Shi, Fei
    Liu, Weijie
    Jin, Dongxu
    Song, Jooseok
    TELECOMMUNICATION SYSTEMS, 2014, 57 (02) : 119 - 136
  • [34] A countermeasure against differential power analysis based on random delay insertion
    Bucci, M
    Luzzi, R
    Guglielmo, M
    Trifiletti, A
    2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 3547 - 3550
  • [35] Modified power-analysis attacks on XTR and an efficient countermeasure
    Han, DG
    Izu, T
    Lim, J
    Sakurai, K
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 305 - 317
  • [36] An on-chip signal suppression countermeasure to power analysis attacks
    Ratanpal, GB
    Williams, RD
    Blalock, TN
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) : 179 - 189
  • [37] Deep Learning Side-Channel Attacks against Lightweight SCA Countermeasure RSM-AES
    Fukuda, Yuta
    Yoshida, Kota
    Hashimoto, Hisashi
    Fujino, Takeshi
    PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [38] Dynamic Countermeasure Against the Zero Power Analysis
    Danger, Jean-Luc
    Guilley, Sylvain
    Hoogvorst, Philippe
    Murdica, Cedric
    Naccache, David
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 140 - 147
  • [39] On the masking countermeasure and higher-order power analysis attacks
    Standaert, FX
    Peeters, E
    Quisquater, JJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 562 - 567
  • [40] Countermeasure of TWINE against Power Analysis Attack
    Nozaki, Yusuke
    Asahi, Kensaku
    Yoshikawa, Masaya
    2015 IEEE INTERNATIONAL MEETING FOR FUTURE OF ELECTRON DEVICES, KANSAI (IMFEDK), 2015,