PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Power equalization of AES FPGA implementation

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis (DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorial circuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) device using the standard and power-equalized methods. Power traces for DPA have been collected using XPower tool. Simulation results show that standard AES implementation can be broken after N=500 encryptions, while power-equalized counterpart shows no correlation between power consumption and the cipher key after N=2000 encryptions.
Rocznik
Strony
125--128
Opis fizyczny
Bibliogr. 14 poz., rys.
Twórcy
  • Department of Microelectronic Systems, Gdansk University of Technology, 11/12 Narutowicza St., 80-952 Gdansk, Poland, marek.strachacki@intel.com
Bibliografia
  • [1] H. Bar-El, “Introduction to side channel attacks”, in White Paper, Discretix Technologies Ltd, Israel, 1999.
  • [2] P. Kocher, J. Jaffe, and B. Jun, “Introduction to differential power analysis and related attacks”, Technical Report, Cryptography Research Inc. 1, http://www.cryptography.com/dpa/technical (1998).
  • [3] P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis”, Advances in Cryptology: Proc. CRYPTO-99 LNCS 1666, 388–397 (1999).
  • [4] S. Ors, F. Gurkaynak, E. Oswald, and B. Preneel, “Poweranalysis attack on an ASIC AES implementation”, Int. Conf. Information Technology: Coding and Computing 1, 546–552 (2004).
  • [5] M. Pierson, B. Brady, Low Cost Differential Power Analysis (DPA) Resistant Crypto-Chips, University of California, California, 2006.
  • [6] L. McDaniel, An Investigation of Differential Power Analysis on FPGA-Based Encryption Systems, Virginia Polytechnic Institute, Virginia, 2003.
  • [7] P. Fahn and P. Pearson, “IPA: A new class of power attacks”, Proc. 1st Int. Workshop on Cryptographic Hardware and Embedded Systems 1717, 173–186 (1999).
  • [8] J. Gawinecki and P. Bora, “Safety analysis of imptementation of equipment algorithms of information coding”, National Symposium of Telecommunication and Telecomputing 1, CDROM (2006), in Polish.
  • [9] K. Tiri and I. Verbauwhede, “Synthesis of secure FPGA implementation”, Int. Workshop on Logic and Synthesis 1, 224–231 (2004).
  • [10] M. Akkar and C. Giraud, “An implementation of DES and AES, secure against some attacks”, Int. Workshop on Cryptographic Hardware and Embedded Systems 2162, 309–318 (2001).
  • [11] M. Gomułkiewicz and M. Kutyłowski, “Hamming weight attacks on cryptographic hardware – breaking masking defense”, 7th Proc. Eur. Symposium on Research in Computer Security 2502, 90–103 (2002).
  • [12] L. Benini, A. Macii, E. Macii, E. Omerbegovic, M. Poncino, and F. Pro, „Energy-aware design techniques for differential power analysis protection”, Design Automation Conf. 1, 36–41 (2003).
  • [13] M. Strachacki and S. Szczepański, “Implementation of AES algorithm resistant to differential power analysis”, 15th Proc. Int. Conf. Electronic, Circuits and Systems 1, 214–217 (2008).
  • [14] J. Daemen and V. Rijmen, “AES proposal: rijndael”, Proc. First AES Candidate Conf. 1, CD-ROM (1998).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPG8-0020-0013
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.