Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking

Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 6

Abstract

Abstract:The analysis of the effectiveness of Leakage Power Analysis (LPA) attacks to cryptographic VLSI circuits on which circuit level countermeasures against Differential Power Analysis (DPA) are adopted. Security metrics used for assessing the DPA-resistance of crypto core implementations is AES encipher and decipher operations and masking is a common method used to prevent differential power analysis (DPA) attack. First, reordering the execution sequence of SubBytes and ShiftRows and partition new critical path of the masked SubBytes followed by the masked MixColumns, and transform computations from GF (28) to GF (24)2 that efficiently reduces the area. Second, developing an algorithm to search for an optimal transformation matrix of the map function to reduce the critical path of the masked Mix Columns. Third, reusing first order masked SubBytes for higher order masked SubBytes to optimize area without compromising performance. The LPA attacks can be successfully carried out on Higher Order DPA-Resistant AES in presence of process variations. Keywords:Leakage Power Analysis (LPA), Differential Power Analysis (DPA), SubBytes, ShiftRows.

Authors and Affiliations

Malini S, Manju Priya K, Shiney Immaculate S

Keywords

Related Articles

Design of Information and Telecommunication Systems with Multi-Hour, Multiservice Traffic and Multilayer Graph Usage

At the current moment, despite the large number of publications in the direction of self-similar traffic studies, deficit of studies involving the use of models for the synthesis of multi-service telecommunication networ...

A Novel Decision Algorithm for Vertical Handoff between UMTS and WiMAX

The benefits brought about by 3G networks such as UMTS, it is increasingly desirable to integrate 3G networks with WiMAX.. WiMAX is used to extend 3G networks at certain locations in order to provide improved services an...

Numerical Analysis of Temperature Depression in A Multi-Fin Array

The purpose of the present study is to analyze two-dimensional heat transfer analysis in arrayed fins with thermal dissipation. The heat conduction equation for the multi-fin array is solved employing finite element meth...

An Implementation of Sequential Rule Mining Using Mapreduce Based Genetic Algorithm

Sequential rule mining is a fundamental technique of data mining which has many application one of which is in the area of bioinformatics. Bioinformatics is an application of information technology to store gigantic biol...

Evaluation of Basic Parameters about Heating Properties of Nano Drilling Fluid- New Aspect

Experiments are held to investigate the effect of ferric oxide nano particles on the thermo electrical properties of drilling slurry. The main purpose of this study is to improve the thermo electrical properties of drill...

Download PDF file
  • EP ID EP385568
  • DOI -
  • Views 138
  • Downloads 0

How To Cite

Malini S, Manju Priya K, Shiney Immaculate S (2016). Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking. Scholars Journal of Engineering and Technology, 4(6), 284-288. https://europub.co.uk/articles/-A-385568