Abstrakt

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis

V.S.Subarsana, C.K.Gobu

In cryptography, the Advanced Encryption Standard (AES) is one of the most popular algorithms used in symmetric key cryptography. It is available in many different encryption packages. AES is a 128 bit Symmetric block cipher which is based on a design principle known as a Substitution permutation network. Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device (such as a smart card, tamper-resistant "black box", or integrated circuit). The attack can non-invasively extract cryptographic keys and other secret information from the device. Differential power analysis (DPA) is a side-channel attack which involves statistically analyzing power consumption from a cryptosystem. Several methods have been proposed in literatures to resist the DPA attack in cryptographic device, but they largely increase the hardware cost and severely degrade the throughput. In existing system, the security problem is resolved by a new architecture with selfgenerated true random sequence. DPA countermeasure circuit can effectively reduce the area overhead and throughput degradation.

Haftungsausschluss: Dieser Abstract wurde mit Hilfe von Künstlicher Intelligenz übersetzt und wurde noch nicht überprüft oder verifiziert