• DocumentCode
    1753907
  • Title

    A new and efficient approach to protect AES against differential power analysis

  • Author

    Masoumi, Massoud ; Mohammadi, Sohail

  • Author_Institution
    Islamshahr Branch, Islamshahr Azad Univ., Islamshahr, Iran
  • fYear
    2011
  • fDate
    21-23 Feb. 2011
  • Firstpage
    59
  • Lastpage
    66
  • Abstract
    Developed by Paul Kocher, Joshua Jaffe, and Benjamin Jun in 1999, Differential Power Analysis (DPA) represents a unique and powerful cryptanalysis technique. Insight into the encryption and decryption behavior of a cryptographic device can be determined by examining its electrical power signature. This paper describes a novel approach for implementation of the AES algorithm which provides a significantly improved strength against differential power analysis with a minimal additional hardware overhead. Our method is based on randomization in composite field arithmetic which entails an area penalty of only 7% while does not decrease the working frequency, does not alter the algorithm and keeps perfect compatibility with the published standard. The efficiency of the proposed technique was verified by practical results obtained from real implementation on a Xilinx Spartan-II FPGA.
  • Keywords
    cryptography; AES; DPA; Xilinx Spartan-II FPGA; composite field arithmetic; cryptanalysis technique; differential power analysis; electrical power signature; Algorithm design and analysis; Correlation; Encryption; Hardware; Polynomials; Power demand;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Security (WorldCIS), 2011 World Congress on
  • Conference_Location
    London
  • Print_ISBN
    978-1-4244-8879-7
  • Electronic_ISBN
    978-0-9564263-7-6
  • Type

    conf

  • Filename
    5749883