ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

FPGA - Based Evaluation of Power Analysis Attacks and Its Countermeasures on Asynchronous S-Box

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 13)

Publication Date:

Authors : ; ;

Page : 204-210

Keywords : Substitution Box; Null Conversion Logic; Side Channel Attack; Simple Power Analysis; Advanced Encryption Standard.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A novel asynchronous S-Box design for AES cryptosystems is proposed and validated. The S-Box is considered as the most critical component in AES crypto-circuits since it consumes the most power and leaks the most information against side channel attacks. The proposed design completely based on a delay insensitive logic paradigm known as Null Conversion Logic (NCL). Asynchronous S-Box is based on self-time logic referred to as NCL which supports few beneficial properties for resisting SCAs such as clock free, duail rail encoding and monotonic transitions so that it consumes less power therefore suitable for energy constrained mobile crypto-applications. These beneficial properties make it difficult for an attacker to decipher secret key embedded within the cryptographic circuits of the FPGA board. Resistant to SCAs of both existing and proposed S-Box design are presented using differential power analysis (DPA) and correlation power analysis (CPA) attacks. The power measurement result showed that the NCL S-Box had lower total power consumption than original and effective against DPA and CPA attacks.

Last modified: 2014-12-02 20:30:21