Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking
Journal Title: Scholars Journal of Engineering and Technology - Year 2016, Vol 4, Issue 6
Abstract
Abstract:The analysis of the effectiveness of Leakage Power Analysis (LPA) attacks to cryptographic VLSI circuits on which circuit level countermeasures against Differential Power Analysis (DPA) are adopted. Security metrics used for assessing the DPA-resistance of crypto core implementations is AES encipher and decipher operations and masking is a common method used to prevent differential power analysis (DPA) attack. First, reordering the execution sequence of SubBytes and ShiftRows and partition new critical path of the masked SubBytes followed by the masked MixColumns, and transform computations from GF (28) to GF (24)2 that efficiently reduces the area. Second, developing an algorithm to search for an optimal transformation matrix of the map function to reduce the critical path of the masked Mix Columns. Third, reusing first order masked SubBytes for higher order masked SubBytes to optimize area without compromising performance. The LPA attacks can be successfully carried out on Higher Order DPA-Resistant AES in presence of process variations. Keywords:Leakage Power Analysis (LPA), Differential Power Analysis (DPA), SubBytes, ShiftRows.
Authors and Affiliations
Malini S, Manju Priya K, Shiney Immaculate S
Design of Information and Telecommunication Systems with Multi-Hour, Multiservice Traffic and Multilayer Graph Usage
At the current moment, despite the large number of publications in the direction of self-similar traffic studies, deficit of studies involving the use of models for the synthesis of multi-service telecommunication networ...
A Novel Decision Algorithm for Vertical Handoff between UMTS and WiMAX
The benefits brought about by 3G networks such as UMTS, it is increasingly desirable to integrate 3G networks with WiMAX.. WiMAX is used to extend 3G networks at certain locations in order to provide improved services an...
Numerical Analysis of Temperature Depression in A Multi-Fin Array
The purpose of the present study is to analyze two-dimensional heat transfer analysis in arrayed fins with thermal dissipation. The heat conduction equation for the multi-fin array is solved employing finite element meth...
An Implementation of Sequential Rule Mining Using Mapreduce Based Genetic Algorithm
Sequential rule mining is a fundamental technique of data mining which has many application one of which is in the area of bioinformatics. Bioinformatics is an application of information technology to store gigantic biol...
Evaluation of Basic Parameters about Heating Properties of Nano Drilling Fluid- New Aspect
Experiments are held to investigate the effect of ferric oxide nano particles on the thermo electrical properties of drilling slurry. The main purpose of this study is to improve the thermo electrical properties of drill...