Combinational Counters: A Low Overhead Approach to Address DPA Attacks
Autor: | Ghobad Zarrinchian, Morteza Saheb Zamani |
---|---|
Rok vydání: | 2019 |
Předmět: |
Low overhead
business.industry Computer science 020208 electrical & electronic engineering Cryptography 02 engineering and technology General Medicine Adversary 020202 computer hardware & architecture Power analysis Hardware and Architecture Embedded system 0202 electrical engineering electronic engineering information engineering Electrical and Electronic Engineering business |
Zdroj: | Journal of Circuits, Systems and Computers. 29:2050097 |
ISSN: | 1793-6454 0218-1266 |
DOI: | 10.1142/s0218126620500978 |
Popis: | Differential Power Analysis (DPA) attacks are known as viable and practical techniques to break the security of cryptographic algorithms. In this type of attack, an adversary extracts the encryption key based on the correlation of consumed power of the hardware running encryption algorithms to the processed data. To address DPA attacks in the hardware layer, various techniques have been proposed thus far. However, current techniques generally impose high performance overhead. Especially, the power overhead is a serious issue which may limit the applicability of current techniques in power-constrained applications. In this paper, combinational counters are explored as a way to address the DPA attacks. By randomizing the consumed power in each clock cycle of the circuit operation, these counters can enhance the resistance of the cryptographic cores against DPA attacks with low power overhead as well as zero timing overhead. Experimental results for an AES S-Box module in 45[Formula: see text]nm technology reveal that the proposed technique is capable of achieving higher level of security in comparison to two other approaches while preserving the power and performance overhead at a same or lower level. |
Databáze: | OpenAIRE |
Externí odkaz: |