Abstract

In modern wireless communication world, the security of data transfer has been the most challenging task. In embedded system, AES is the most extensively used cryptographic algorithm in practice. But its functionality has been disrupted by the DPA attack. There have been several countermeasures to tackle those attacks, but this study proposes variably a new measure to defend this DPA attack. DPA attack is possible due to the power fluctuation happening due to sequential circuit clocking during the process of substitute byte in AES encryption in the first round and last round. Hence to prevent this, the power variation is maintained at a constant pace throughout the data processing. This is achieved by incorporating a combinational logic design instead of a sequential logic circuit in AES. The proposed design is implemented in Vertex III FPGA device and found even after 17230 power traces the secret key is not disclosed as the power fluctuations is completely random. The power consumption when experimented by micro wind software proves to be constant and the same power (almost) is obtained while implementing it hardware and no chance of identifying the instant of data processing is achieved.

Highlights

  • In this modern world, the use of cell phones, smart cards and other wireless applications became unavoidable in human’s everyday life

  • Differential Power Analysis (DPA) is the most popular attack made on AES, where the power analysis is done based on hamming distance and hamming weight models

  • The most distinguishing plan for power analysis attack is on the smart cards which are capable of performing secured computations

Read more

Summary

Introduction

The use of cell phones, smart cards and other wireless applications became unavoidable in human’s everyday life. The security of data transfer should be taken into account. DPA is the most popular attack made on AES, where the power analysis is done based on hamming distance and hamming weight models. Few stretchy algorithms are designed for secured data transfer protocols and applications have been introduced to face the rising demand of cryptography. A preventive measure for threat of power analysis has been suggested and a preventive method for AES is examined and implemented

Related Work
Experimental Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call