会议专题

The FPGA Implementations of AES Resistant to Differential Power Analysis

This paper presents the FPGA implementation of the Advanced Encryption Standard (AES) with masking countermeasure for the differential power analysis (DPA) attacks. DPA is a powerful side-channel analysis (SCA) attack. A side-channel analysis (SCA) attack takes advantage of implementation specific characteristics to recover the secret parameters involved in the computation. The goals of side-channel attack countermeasures are reducing the correlation between the side-channel data and the secret data. Data masking is one of the most powerful countermeasures against side channel attacks. The message and the key are masked with some random values at the beginning of computations. We have implemented the AES algorithm on an FPGA by using masking method.

AES Masking Differential Power Analysis Attacks

ZOU Cheng ZHANG Peng ZHAO Qiang

Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang, Hebei, 050003, China

国际会议

第八届国际测试技术研讨会(8th International Symposium on Test and Measurement)

重庆

英文

3396-3399

2009-08-01(万方平台首次上网日期,不代表论文的发表时间)