مقاوم سازی الگوریتم های رمزنگاری در داخل FPGA به کمک PLL

سال انتشار: 1398
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 457

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_TJEE-49-2_012

تاریخ نمایه سازی: 20 آذر 1398

چکیده مقاله:

Now days, sharing data in communication systems and computers require high levels of Information security. Side channel attack is one of the methods which it is applied to attack cryptographic systems such as smart cards. In this paper, a new approach for countermeasuring cryptographic algorithms has been proposed and implemented on FPGA. The scheme is based on using Phase Locked Loop in AES algorithm which by disturbing power consumption pattern and execution time of different rounds, the resistance of the algorithm against power attack has been increased. Masking and hiding technique has been used to protect the encryption key. Overall, the proposed method has been simulated within TSMC 65nm technology platform and outstanding success has been obtained; in applying the technique to AES, the overhead was 13% in CMOS area, 15% in power consumption, 2% decrease in working frequency while finding the key became difficult for attackers. In addition, the proposed method has been implemented on FPGA and satisfactory results have been obtained for an acceptable number of samples of the power trace.

کلیدواژه ها:

Advanced Encryption Standard (AES) ، Differential Power Analysis (DPA) ، Power Analysis (PA) ، power measurement ، Field Programmable Gate Array (FPGA)

نویسندگان

V. Rashtchi

Faculty of Electrical and Computer Engineering, University of Zanjan, Zanjan, Iran

H. Mousavi

Faculty of Electrical and Computer Engineering, University of Zanjan, Zanjan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • محمد آسیایی، دومینو مبتنی بر مقایسه جریان ارتقاءیافته برای طراحی ... [مقاله ژورنالی]
  • پرهام دری، علی قیاسیان، حسین سعیدی، طراحی و پیاده سازی ... [مقاله ژورنالی]
  • M. Lazzaroni, V. Piuri, and C. Maziero, Computer security aspects ...
  • P. Bilski and W. Winiecki, Multi-core implementation of the symmetric ...
  • P. Bilski, W. Winiecki, and T. Adamski, Implementation of symmetric ...
  • P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, ...
  • Lee, J.W., Chung, S.C., Chang, H.C. and Lee, C.Y., Efficient ...
  • E. Brier, C. Clavier, and F. Olivier, Correlation power analysis ...
  • S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks, ...
  • R. Modugu, Y.-B. Kim, and M. Choi, Design and performance ...
  • S. B. Ors, E. Oswald, and B. Preneel, Power-analysis attacks ...
  • J. Wu, Y. Shi, and M. Choi, Measurement and evaluation ...
  • K. Tiri and I. Verbauwhede, A logic level design methodology ...
  • S. Mangard, A simple power-analysis (SPA) attack on implementations of ...
  • R. Bevan and E. Knudsen, Ways to enhance differential power ...
  • Siddika Berna, Ors, Frank K. G, urkaynak, Elisabeth Oswald, and ...
  • J. Li, W. Shan, and C. Tian, Hamming distance model ...
  • Masoumi, M., Habibi, P., Dehghan, A., Jadidi, M. and Yousefi, ...
  • E. Brier, C. Clavier, F. Olivier, Correlation Power Analysis with ...
  • T.S. Messerges. Using second-order power analysis to attack DPA resistant ...
  • D. Sokolov, J. P. Murphy, A. Bystrov, and A. Yakovlev, ...
  • S. Guiley, S. L. Sauvage, P. Hoogvorst, R. Pacalet, G. ...
  • D. Hwang, K. Tiri, A. Hodjat, B. C. Lai, S. ...
  • T.S. Messerges, E. Dabbish, and R. Sloan, Investigations of Power ...
  • S. Yang, W. Wolf, N. Vijaykrishnan, D.N. Serpanos, Y. Xie, ...
  • Daisuke Suzuki, Minoru Saeki, and Tetsuya Ichikawa. Random Switching Logic: ...
  • Gülmezoğlu B, Inci MS, Irazoqui G, Eisenbarth T, Sunar B. ...
  • Gülmezoğlu, B., Inci, M.S., Irazoqui, G., Eisenbarth, T. and Sunar, ...
  • J. J. A. Fournier, S. Moore, H. Li, R. Mullins, ...
  • K. Tiri, D. Hwang, A. Hodjat, B. C. Lai, S. ...
  • Mangard, S., Oswald, E., Popp, T.: Power analysis attacks: revealing ...
  • Liu PC, Chang HC, Lee CY. A low overhead DPA ...
  • Lu, Y., O Neill, M.P. and McCanny, J.V., 2008, December. ...
  • Moore, S., Anderson, R., Cunningham, P., Mullins, R. and Taylor, ...
  • K. Tiri, and I. Verbauwhede, Securing Encryption Algorithms against DPA ...
  • Standaert, F.X., Rouvroy, G. and Quisquater, J.J., 2006, August. FPGA ...
  • Johnson, A.P., Chakraborty, R.S. and Mukhopadhyay, D., October. A Novel ...
  • Trimberger SM, editor. Field-programmable gate array technology. Springer Science & ...
  • Synopsys. Inc., PrimeTime®PX User Guide Version E-2010.12, Mar. 2011. ...
  • M. Alioto, S. Bongiovanni, M. Djukanovic, G. Scotti, and A. ...
  • S. Bongiovanni, F. Centurelli, G. Scotti, and A. Trifiletti. Design ...
  • U. R ̈uhrmair, X. Xu, J. S ̈olter, A. Mahmoud, ...
  • A. Moradi, D. Oswald, C. Paar, andP. Swierczynski, Side channel ...
  • D. Suzuki et al., Fabrication of a 3000-6-input-LUTs embedded and ...
  • Y. Zafar and A. Ahmed, A Novel FPGA Compliant Micropipeline, ...
  • M. Khalil, and M. Hani, Verilog Design of a 256-Bit ...
  • Trimberger SM, editor. Field-programmable gate array technology. Springer Science & ...
  • Avital M, Dagan H, Keren O, Fish A. Randomized multitopology ...
  • D. Hwang, et al., AES-based Security Coprocessor IC in 0.18 ...
  • Attaran, A. and Mirhassani, M., 2015, July. An embedded low-overhead ...
  • C. Tokunaga, D. Blaauw, Secure AES engine with a local ...
  • M. Doulcier-Verdier, et al., A side-channel and fault-attack resistant AES ...
  • نمایش کامل مراجع