An efficient hardware countermeasure against differential power analysis attack

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Extensive research on modern cryptography ensures significant mathematical immunity to conventional cryptographic attacks. However, power consumption in cryptographic hardware leak secret information. Differential power analysis attack (DPA) is such a powerful tool to extract the secret key from cryptographic devices. To defend against these DPA attacks, hiding and masking methods are widely used. But these methods increase high area overhead and performance degradation in hardware implementation. In this aspect, this paper proposes a hardware countermeasure circuit, which, is integrated hardware module with the intermediate stages in S-Box. The countermeasure circuit utilizes the dynamic power dissipation characteristics of CMOS and provides countermeasure against DPA attacks. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Choudhury, A. J., Park, B. S., Bruce, N., Lee, Y. S., Lim, H., & Lee, H. J. (2011). An efficient hardware countermeasure against differential power analysis attack. In Communications in Computer and Information Science (Vol. 206 CCIS, pp. 153–159). https://doi.org/10.1007/978-3-642-24106-2_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free