Abstract

The side-channel attacks are one of the effortless and commanding attacks against cryptographic implementation and their intention vary from protocols, modules, primitives and system. As a result of this attack, a serious threat to the security of cryptographic module was encountered. In effect, realization of the cryptographic algorithm has to take some countermeasure to resist against this type of attacks. This study presents an efficient S-Box design using Null Conventional Logic (NCL) for Humming Bird-2 which is an ultra lightweight cryptographic algorithm. The recommended architecture was developed using Verilog HDL and implemented on altera cyclone IV E. The results are promising in terms of Area and Degree of Confusion (DOC).

Highlights

  • The increased enslavement on digitized information in our society and the expansion of worldwide communication network like internet makes information more vulnerable to intruder Takemura

  • Design of Substitution Box (S-Box) falls under two circumstances which is Boolean Function Representation (BFR) and Hardware-Friendly Rohini etal. In BFR, the Boolean function involved in S-Box design should be optimized with high data security, so that the Timing attack of the data can be prevented

  • This study presents an S-Box design based on Null Conversion Logic (NCL) which shows a remarkable performance improvements in encrypted data based on Degree of Confusion

Read more

Summary

INTRODUCTION

Information is valuable for cryptanalysis which is abstracted from that physical medium interaction. This type of information is called as sidechannel information and attack based on this data is called as side-channel attack This attack rely on the way, the cryptographic algorithm is implemented, somewhat than the algorithm itself. The cryptanalysis is purely based on mathematical object the attack rely on side-channel information is called as Implementation attack Rajakumar etal. SCA is achieved by the physical parameters like Electromagnetic Radiation, heat, sound, visible light, power consumption, execution time, frequency, error messages and faulty outputs Salem etal. The software based SCA attack rely on Mathematical calculation, key breaking, S-Box intrusion and reverse-engineering; out of which S-Box implementation is research of interest now. The rest of the paper proceed as follow, Humming Bird-2 (HB-2) algorithm, NCL based S-Box, Performance metrics and Conclusion

Humming Bird-2
NCL S-Box
EXPERIMENTAL RESULT
CONCLUSION
REFERENCE
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call