Investigation Role of Sbox to Leakage DPA Information for TDES in FPGA Targets

2012 ◽  
Vol 256-259 ◽  
pp. 2820-2825
Author(s):  
A Zadali Mohammad Kootiani ◽  
P Abedi

Differential power analysis (DPA) attack is an important threat that researchers spend great effort to make crypto algorithms resistant against DPA attacks. In order to determine whether the hardware has DPA leakage before manufacturing, an accurate power model in digital simulation has been generated. FPGAs Arrays are attractive options for hardware implementation of encryption algorithms. In this paper, we show generated power model by using integer numbers whole DES’s rounds vs. S-Box alone, and this method gives more realistic results to determine the effectiveness of the improvements protect whole DES rather than in which only informer elements in the DES round. In particular this allows the user to isolate some parts of its implementation in order to analyze information leakages directly linked to them. We review s-box because it’s get 2kbit or 20% CLB slice from FPGA to implement DES or TDES. This paper try to identify role of Sbox in DPA.

2019 ◽  
Vol 29 (06) ◽  
pp. 2050097
Author(s):  
Ghobad Zarrinchian ◽  
Morteza Saheb Zamani

Differential Power Analysis (DPA) attacks are known as viable and practical techniques to break the security of cryptographic algorithms. In this type of attack, an adversary extracts the encryption key based on the correlation of consumed power of the hardware running encryption algorithms to the processed data. To address DPA attacks in the hardware layer, various techniques have been proposed thus far. However, current techniques generally impose high performance overhead. Especially, the power overhead is a serious issue which may limit the applicability of current techniques in power-constrained applications. In this paper, combinational counters are explored as a way to address the DPA attacks. By randomizing the consumed power in each clock cycle of the circuit operation, these counters can enhance the resistance of the cryptographic cores against DPA attacks with low power overhead as well as zero timing overhead. Experimental results for an AES S-Box module in 45[Formula: see text]nm technology reveal that the proposed technique is capable of achieving higher level of security in comparison to two other approaches while preserving the power and performance overhead at a same or lower level.


Methodology ◽  
2006 ◽  
Vol 2 (1) ◽  
pp. 7-15 ◽  
Author(s):  
Joachim Gerich ◽  
Roland Lehner

Although ego-centered network data provide information that is limited in various ways as compared with full network data, an ego-centered design can be used without the need for a priori and researcher-defined network borders. Moreover, ego-centered network data can be obtained with traditional survey methods. However, due to the dynamic structure of the questionnaires involved, a great effort is required on the part of either respondents (with self-administration) or interviewers (with face-to-face interviews). As an alternative, we will show the advantages of using CASI (computer-assisted self-administered interview) methods for the collection of ego-centered network data as applied in a study on the role of social networks in substance use among college students.


2021 ◽  
pp. 107385842110366
Author(s):  
Emilia Giannella ◽  
Valentino Notarangelo ◽  
Caterina Motta ◽  
Giulia Sancesario

Biobanking has emerged as a strategic challenge to promote knowledge on neurological diseases, by the application of translational research. Due to the inaccessibility of the central nervous system, the advent of biobanks, as structure collecting biospecimens and associated data, are essential to turn experimental results into clinical practice. Findings from basic research, omics sciences, and in silico studies, definitely require validation in clinically well-defined cohorts of patients, even more valuable when longitudinal, or including preclinical and asymptomatic individuals. Finally, collecting biological samples requires a great effort to guarantee respect for transparency and protection of sensitive data of patients and donors. Since the European General Data Protection Regulation 2016/679 has been approved, concerns about the use of data in biomedical research have emerged. In this narrative review, we focus on the essential role of biobanking for translational research on neurodegenerative diseases. Moreover, we address considerations for biological samples and data collection, the importance of standardization in the preanalytical phase, data protection (ethical and legal) and the role of donors in improving research in this field.


Author(s):  
Juncheng Chen ◽  
Jun-Sheng Ng ◽  
Nay Aung Kyaw ◽  
Ne Kyaw Zwa Lwin ◽  
Weng-Geng Ho ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document