Power equalization of AES FPGA implementation

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis (DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorial circuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) device using the standard and power-equalized methods. Power traces for DPA have been collected using XPower tool. Simulation results show that standard AES implementation can be broken after N=500 encryptions, while power-equalized counterpart shows no correlation between power consumption and the cipher key after N=2000 encryptions.

Cite

CITATION STYLE

APA

Strachacki, M., & Szczepański, S. (2010). Power equalization of AES FPGA implementation. Bulletin of the Polish Academy of Sciences: Technical Sciences, 58(1), 125–128. https://doi.org/10.2478/v10175-010-0013-7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free