Abstract

ABSTRACTConventional design of cryptographic integrated circuits is vulnerable to differential power analysis (DPA). Mostly XOR gates are used for performing cryptographic computations. By observing the side channel information adversary can retrieve secret information. Data processing power of conventional gates are directly proportional to input bits transition, which are used by DPA attacker. To overcome this problem, this paper proposes DPA resistant modulo multiplier using MOS-switches and double switch differential cascode voltage switch logic (DS-DDCVSL). Proposed implementation gives minimum bit transition in those gates. It scrambles computational power irrespective of input bit patterns and shows constant power trace and makes the implementation DPA resistant.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.