Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/83739
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Pammu, Ali Akbar | en |
dc.contributor.author | Chong, Kwen-Siong | en |
dc.contributor.author | Gwee, Bah Hwee | en |
dc.date.accessioned | 2017-06-29T04:22:29Z | en |
dc.date.accessioned | 2019-12-06T15:31:01Z | - |
dc.date.available | 2017-06-29T04:22:29Z | en |
dc.date.available | 2019-12-06T15:31:01Z | - |
dc.date.issued | 2016 | en |
dc.identifier.citation | Pammu, A. A., Chong, K.-S., & Gwee, B. H. (2016). Highly secured arithmetic hiding based S-Box on AES-128 implementation. 2016 International Symposium on Integrated Circuits (ISIC). (pp. 1-4). | en |
dc.identifier.uri | https://hdl.handle.net/10356/83739 | - |
dc.description.abstract | We propose an arithmetic hiding technique on Advanced Encryption Standard (AES) algorithm implementation to highly secure the algorithm against Side-Channel Attack (SCA). The arithmetic operations run parallel with Substitution-Box (S-Box) operation of the AES to hide the correlated leakage power dissipation with processed data. There are two key features in our proposed hiding technique. First, the function of the arithmetic hiding is independent with S-Box operation and its power dissipation is dominant over the S-Box. Therefore, the dependency of the total power dissipation with processed data in the AES algorithm is relatively low. Second, the security level of proposed technique against SCA based on Correlation Power Analysis (CPA) and Correlation Electromagnetic Analysis (CEMA) attack are increased by 119× and 63× respectively, compared with unprotected S-Box. This is due to the leakage physical parameters (i.e. power dissipation and EM emanation) which is generated by the arithmetic operation hides the leakage parameters of the S-Box operation. Based on the measurement results on Sakura-X FPGA board, which performs AES-128 algorithm, our proposed technique dissipates 3.8mW and features 1.18× higher power dissipation than the unprotected S-Box implementation. However, our proposed arithmetic hiding technique is highly secured, as the result of CPA and CEMA attack require 38,000 power traces and 44,000 EM traces respectively to reveal the secret key. The required number of traces are significantly higher than the unprotected S-Box, which is only 319 power traces and 691 EM traces respectively to uncover the same secret key. | en |
dc.description.sponsorship | ASTAR (Agency for Sci., Tech. and Research, S’pore) | en |
dc.format.extent | 4 p. | en |
dc.language.iso | en | en |
dc.rights | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/ISICIR.2016.7829736]. | en |
dc.subject | Side-Channel Attack | en |
dc.subject | Arithmetic Hiding | en |
dc.title | Highly secured arithmetic hiding based S-Box on AES-128 implementation | en |
dc.type | Conference Paper | en |
dc.contributor.school | School of Electrical and Electronic Engineering | en |
dc.contributor.conference | 2016 International Symposium on Integrated Circuits (ISIC) | en |
dc.contributor.research | Centre for Integrated Circuits and Systems | en |
dc.identifier.doi | 10.1109/ISICIR.2016.7829736 | en |
dc.description.version | Accepted version | en |
item.grantfulltext | open | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | EEE Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Highly Secured Arithmetic Hiding based S-Box .pdf | Main Article | 529.75 kB | Adobe PDF | ![]() View/Open |
SCOPUSTM
Citations
50
4
Updated on Mar 23, 2023
Page view(s) 20
571
Updated on Mar 29, 2023
Download(s) 50
98
Updated on Mar 29, 2023
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.