Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking

Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 6

Abstract

Abstract:The analysis of the effectiveness of Leakage Power Analysis (LPA) attacks to cryptographic VLSI circuits on which circuit level countermeasures against Differential Power Analysis (DPA) are adopted. Security metrics used for assessing the DPA-resistance of crypto core implementations is AES encipher and decipher operations and masking is a common method used to prevent differential power analysis (DPA) attack. First, reordering the execution sequence of SubBytes and ShiftRows and partition new critical path of the masked SubBytes followed by the masked MixColumns, and transform computations from GF (28) to GF (24)2 that efficiently reduces the area. Second, developing an algorithm to search for an optimal transformation matrix of the map function to reduce the critical path of the masked Mix Columns. Third, reusing first order masked SubBytes for higher order masked SubBytes to optimize area without compromising performance. The LPA attacks can be successfully carried out on Higher Order DPA-Resistant AES in presence of process variations. Keywords:Leakage Power Analysis (LPA), Differential Power Analysis (DPA), SubBytes, ShiftRows.

Authors and Affiliations

Malini S, Manju Priya K, Shiney Immaculate S

Keywords

Related Articles

On the cubic Equation with four unknowns

The sequences of integral solutions to the cubic equation with four variables are obtained. A few properties among the solutions are also presented. Keywords: Cubic equation with four unknowns, integral solutions, po...

The Investigation and Analysis of Mathematics Education Practice Courses in local Undergraduate Colleges

Mathematics Education Practice Courses are important ways which normal students linking theory with practice and get under the tutelage of the actual ability to teach and to improve the overall quality. This paper invest...

High resolution sequence stratigraphic analysis of the 1 blocks of the ancient block of the block of the Daqing Oilfield

According to the core, drilling, logging, seismic and combined with the production test and other data, application of high resolution sequence stratigraphy theory, the Daqing oilfield in the ancient 1 block of the oilfi...

Use of new management techniques in the Italian Health care System

The Italian healthcare system is operating in a condition of economic crisis; this system must conform its activity to the criteria of efficiency, effectiveness and economy without disregarding the quality of the service...

Effects of Water Table Fluctuations on Peatland-A Review

The negative influence of global warming has really influenced the need for most of the studies on climate related studies today. Emission of carbon and some other greenhouse gases has been seen as the most factors influ...

Download PDF file
  • EP ID EP385568
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Malini S, Manju Priya K, Shiney Immaculate S (2016). Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking. Scholars Journal of Engineering and Technology, 4(6), 284-288. https://europub.co.uk/articles/-A-385568