Low Power Counter Measure for Cryptographic Applications using Asynchronous S-Box
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
In this work, a novel asynchronous combinational S-Box (substitution box) design for AES (Advanced Encryption Standard) cryptosystems is projected and validated. The S-Box is examined because the final vital component in AES crypto-circuits since it employs the foremost power and leaks the most information contrary to side-channel attacks. The proposed technique is based on a delay-insensitive logic paradigm referred to as Null Conventional Logic (NCL).The projected NCL S-Box provides vast benefits over existing designs since it consumes less power therefore suited for energy control mobile crypto-applications. It also emits less noise and has blandish power peaks therefore leaks less information against side-channel attacks such as differential power/noise analysis. Functional verification and power measurement of NCL S-Box have been done using Mentor Graphics EDA (Electronic Design Automation) tool to assure low-power side-channel attack-resistant operation of the proposed AES asynchronous S-Box design.
Authors and Affiliations
Shri Suvega. M. R
BRAIN TUMOR CLASSIFICATION USING DATA MINING ALGORITHMS
The classification of brain tumor in the magnetic resonance imaging (MRI) is very important for detecting the existence and outlines of tumors. In this paper, an algorithm about brain tumor classification is based on the...
LOSSLESS IMAGE COMPRESSION VIA LIFTING SCHEME AND SPIHT
Image compression is useful because it helps to reduce the consumption of expensive resources, such as hard disk space or transmission bandwidth .Many compression techniques are in place but there is a scope for h...
Comprehensive study of different pattern matching intrusion detection techniques
Today, at very large scale the internet facility is being used by the peoples. The misuse of information, hack the confidential information of the users, confidential quotations-cash, Ebanking and even in government co...
Simulation and Synthesis for TACIT Network Security in Hardware Description Language Environment
In cryptography, it is necessary to encrypt and decrypt the data for code storage and security. Sometimes it is very difficult to secure physically all access networks. The research paper has introduced a new bloc...
Numerically Analysis of Corrosion Resistance and Control Plate
Salt water Corrosion resistance with can potentially replace the Special marine Time applications. Corrosion is defined as the deterioration of a material, usually a metal, because of a reaction with its environme...