Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking

Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 6

Abstract

Abstract:The analysis of the effectiveness of Leakage Power Analysis (LPA) attacks to cryptographic VLSI circuits on which circuit level countermeasures against Differential Power Analysis (DPA) are adopted. Security metrics used for assessing the DPA-resistance of crypto core implementations is AES encipher and decipher operations and masking is a common method used to prevent differential power analysis (DPA) attack. First, reordering the execution sequence of SubBytes and ShiftRows and partition new critical path of the masked SubBytes followed by the masked MixColumns, and transform computations from GF (28) to GF (24)2 that efficiently reduces the area. Second, developing an algorithm to search for an optimal transformation matrix of the map function to reduce the critical path of the masked Mix Columns. Third, reusing first order masked SubBytes for higher order masked SubBytes to optimize area without compromising performance. The LPA attacks can be successfully carried out on Higher Order DPA-Resistant AES in presence of process variations. Keywords:Leakage Power Analysis (LPA), Differential Power Analysis (DPA), SubBytes, ShiftRows.

Authors and Affiliations

Malini S, Manju Priya K, Shiney Immaculate S

Keywords

Related Articles

Heine Theorem and Its Application

In the first part of this paper, it firstly takes and as an example. It presents that the unary function has Heine theorem of the normal limit existence and promotion form, and also Heine theorem of the abnormal limit...

Web Based Security System

Security systems play an important role in the protection of lives and investment. The aim of this project is to design an efficient and cheap security system, which is accessible from any part of the world through the i...

Based On Campus Network User Behavior Data Acquisition and Processing

This thesis analyzes the behavioral characteristics of network users on the campus network. After capturing and processing communication data and recovering sessions, we can know the group behaviors of the campus users....

Pulsatile Flow of Casson Fluid in Mild Stenosed Artery with Periodic Body Acceleration and Slip Condition

The pulsatile flow of blood through a mild stenosed artery under periodic body acceleration is investigated in this theoretical analysis. The Casson fluid model of blood and the presence of slip (velocity discontinuity)...

Performanceand Thermal Efficiency Parametric Design of an Energy Efficient Rotary Furnace

Abstract:A review of works on rotary furnace was handled and this provokes ingenuity in this paper to consider all parameters necessary to design and developed an energy efficient rotary furnace. High insulation bricks ,...

Download PDF file
  • EP ID EP385568
  • DOI -
  • Views 136
  • Downloads 0

How To Cite

Malini S, Manju Priya K, Shiney Immaculate S (2016). Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking. Scholars Journal of Engineering and Technology, 4(6), 284-288. https://europub.co.uk/articles/-A-385568