scholarly journals Countermeasure against Side Channel Power Attacks in Cryptography Devices

2014 ◽  
Vol 7 (is4) ◽  
pp. 15-20
Author(s):  
K. P. Sridhar
2021 ◽  
Author(s):  
Shaya Wolf ◽  
Hui Hu ◽  
Rafer Cooley ◽  
Mike Borowczak

Cryptography ◽  
2020 ◽  
Vol 4 (2) ◽  
pp. 13
Author(s):  
Ivan Bow ◽  
Nahome Bete ◽  
Fareena Saqib ◽  
Wenjie Che ◽  
Chintan Patel ◽  
...  

This paper investigates countermeasures to side-channel attacks. A dynamic partial reconfiguration (DPR) method is proposed for field programmable gate arrays (FPGAs)s to make techniques such as differential power analysis (DPA) and correlation power analysis (CPA) difficult and ineffective. We call the technique side-channel power resistance for encryption algorithms using DPR, or SPREAD. SPREAD is designed to reduce cryptographic key related signal correlations in power supply transients by changing components of the hardware implementation on-the-fly using DPR. Replicated primitives within the advanced encryption standard (AES) algorithm, in particular, the substitution-box (SBOX)s, are synthesized to multiple and distinct gate-level implementations. The different implementations change the delay characteristics of the SBOXs, reducing correlations in the power traces, which, in turn, increases the difficulty of side-channel attacks. The effectiveness of the proposed countermeasures depends greatly on this principle; therefore, the focus of this paper is on the evaluation of implementation diversity techniques.


2004 ◽  
Vol 91 (1) ◽  
pp. 29-32 ◽  
Author(s):  
Willi Geiselmann ◽  
Rainer Steinwandt

Author(s):  
Chao Luo ◽  
Yunsi Fei ◽  
Aidong Adam Ding ◽  
Pau Closas

Sign in / Sign up

Export Citation Format

Share Document