AES的区域优化实现,具有针对功率分析的混合对策

A. A. Kamal, A. Youssef
{"title":"AES的区域优化实现,具有针对功率分析的混合对策","authors":"A. A. Kamal, A. Youssef","doi":"10.1109/ISSCS.2009.5206179","DOIUrl":null,"url":null,"abstract":"Since its adoption as a new encryption standard by NIST, the Advanced Encryption Standard (AES) has become the default choice for various applications. On the other hand, a straightforward implementation of the AES is vulnerable to different forms of side channel attacks. In this paper, we explore several countermeasure techniques against power analysis attacks. In particular, we present an area optimized design that combines shuffling, as a hiding countermeasure, with some recently proposed masking techniques. The developed power analysis resistant AES-128 ECB encryption/decryption engine requires 3090 slices of a Xilinx Virtex-II xc2v1000-6-bg575 FPGA, runs at a maximum clock speed of 51.75 MHz and produces a throughput of up to 15.33 Mbps.","PeriodicalId":277587,"journal":{"name":"2009 International Symposium on Signals, Circuits and Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"An area-optimized implementation for AES with hybrid countermeasures against power analysis\",\"authors\":\"A. A. Kamal, A. Youssef\",\"doi\":\"10.1109/ISSCS.2009.5206179\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since its adoption as a new encryption standard by NIST, the Advanced Encryption Standard (AES) has become the default choice for various applications. On the other hand, a straightforward implementation of the AES is vulnerable to different forms of side channel attacks. In this paper, we explore several countermeasure techniques against power analysis attacks. In particular, we present an area optimized design that combines shuffling, as a hiding countermeasure, with some recently proposed masking techniques. The developed power analysis resistant AES-128 ECB encryption/decryption engine requires 3090 slices of a Xilinx Virtex-II xc2v1000-6-bg575 FPGA, runs at a maximum clock speed of 51.75 MHz and produces a throughput of up to 15.33 Mbps.\",\"PeriodicalId\":277587,\"journal\":{\"name\":\"2009 International Symposium on Signals, Circuits and Systems\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-07-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Symposium on Signals, Circuits and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISSCS.2009.5206179\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Symposium on Signals, Circuits and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSCS.2009.5206179","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

高级加密标准(Advanced encryption standard, AES)自被NIST采用为新的加密标准以来,已成为各种应用程序的默认选择。另一方面,AES的直接实现容易受到不同形式的侧信道攻击。在本文中,我们探讨了几种对抗功率分析攻击的对策技术。特别是,我们提出了一种区域优化设计,将洗牌作为隐藏对策与最近提出的一些掩蔽技术相结合。开发的抗功耗分析AES-128 ECB加密/解密引擎需要Xilinx Virtex-II xc2v1000-6-bg575 FPGA的3090片,运行在51.75 MHz的最大时钟速度下,产生高达15.33 Mbps的吞吐量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An area-optimized implementation for AES with hybrid countermeasures against power analysis
Since its adoption as a new encryption standard by NIST, the Advanced Encryption Standard (AES) has become the default choice for various applications. On the other hand, a straightforward implementation of the AES is vulnerable to different forms of side channel attacks. In this paper, we explore several countermeasure techniques against power analysis attacks. In particular, we present an area optimized design that combines shuffling, as a hiding countermeasure, with some recently proposed masking techniques. The developed power analysis resistant AES-128 ECB encryption/decryption engine requires 3090 slices of a Xilinx Virtex-II xc2v1000-6-bg575 FPGA, runs at a maximum clock speed of 51.75 MHz and produces a throughput of up to 15.33 Mbps.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Chaos modulation communication channel: A case study A 2.4 GHz high-gain low noise amplifier Modified Ω′ metric for QPP interleavers depending on SNR Information fusion for obstacle recognition in visible and infrared images Graph drawing alogorithms based module placement
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1