Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking

Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 6

Abstract

Abstract:The analysis of the effectiveness of Leakage Power Analysis (LPA) attacks to cryptographic VLSI circuits on which circuit level countermeasures against Differential Power Analysis (DPA) are adopted. Security metrics used for assessing the DPA-resistance of crypto core implementations is AES encipher and decipher operations and masking is a common method used to prevent differential power analysis (DPA) attack. First, reordering the execution sequence of SubBytes and ShiftRows and partition new critical path of the masked SubBytes followed by the masked MixColumns, and transform computations from GF (28) to GF (24)2 that efficiently reduces the area. Second, developing an algorithm to search for an optimal transformation matrix of the map function to reduce the critical path of the masked Mix Columns. Third, reusing first order masked SubBytes for higher order masked SubBytes to optimize area without compromising performance. The LPA attacks can be successfully carried out on Higher Order DPA-Resistant AES in presence of process variations. Keywords:Leakage Power Analysis (LPA), Differential Power Analysis (DPA), SubBytes, ShiftRows.

Authors and Affiliations

Malini S, Manju Priya K, Shiney Immaculate S

Keywords

Related Articles

Design of a University Portal with Biometric Lecture Attendance Monitoring System

Management of information is a herculean task for most institutions. The advent of web portal technology proved promising as it provided ways to curb the difficulties in effectively managing data and information transfer...

Uniform Frequency Sub-Band filtering Approach for Marathi Alphabets Processing

Speech enhancement aims to improve speech quality by using various algorithms. The objective of enhancement is improvement in intelligibility using audio signal processing techniques. The choice of the filter-bank has a...

Parametric Analysis of an Injection Molding System Performance for PET Products Production

Abstract:Plastic products have taken over most domestic and industrial needs of every nation of the world. The increasing demands of these products required an effective manufacturing output hence the need for an effecti...

The Influence of Angkak Treatment on Physical, Chemical and Organoleptical Characteristics of the Castoff Duck Meat Sausage

Abstract: This research is aimed to understand the influence of angkak as curing material and natural color maker on physical and chemical characteristics and also on organoleptical test of castoff duck meat sausage, in...

Fuzzy Distance Measure

This presents a new distance method to find the distance between trapezoidal fuzzy numbers using centriod of centriods. In addition, we prove that our proposed distance measure satisfies metric space properties. So far i...

Download PDF file
  • EP ID EP385568
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Malini S, Manju Priya K, Shiney Immaculate S (2016). Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking. Scholars Journal of Engineering and Technology, 4(6), 284-288. https://europub.co.uk/articles/-A-385568