This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis (DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorial circuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) device using the standard and power-equalized methods. Power traces for DPA have been collected using XPower tool. Simulation results show that standard AES implementation can be broken after N=500 encryptions, while power-equalized counterpart shows no correlation between power consumption and the cipher key after N=2000 encryptions.
CITATION STYLE
Strachacki, M., & Szczepański, S. (2010). Power equalization of AES FPGA implementation. Bulletin of the Polish Academy of Sciences: Technical Sciences, 58(1), 125–128. https://doi.org/10.2478/v10175-010-0013-7
Mendeley helps you to discover research relevant for your work.