Publication | Closed Access
Towards an AES crypto-chip resistant to differential power analysis
51
Citations
2
References
2004
Year
Unknown Venue
Hardware SecurityDifferential Power AnalysisElectrical EngineeringData Encryption StandardEngineeringInformation SecurityCryptanalytic AttackComputer EngineeringComputer ArchitectureLightweight CryptographyComputer ScienceFavorite Masking SchemeHardware Security SolutionSide-channel AttackHypothetical Power ModelData SecurityCryptographyCryptanalysis
Differential power analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher-key. Cryptographic security gets compromised if the current waveforms so obtained correlate with those from a hypothetical power model of the circuit. Such correlations can be minimized by masking datapath operations with random bits in a reversible way. We analyze such countermeasures and discuss how they perform and how well they lend themselves to being incorporated into dedicated hardware implementations of the advanced encryption standard (AES) block cipher. Our favorite masking scheme entails a performance penalty of some 40-50%. We also present a VLSI design that can serve for practical experiments with DPA.
| Year | Citations | |
|---|---|---|
Page 1
Page 1