Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/83739
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPammu, Ali Akbaren
dc.contributor.authorChong, Kwen-Siongen
dc.contributor.authorGwee, Bah Hweeen
dc.date.accessioned2017-06-29T04:22:29Zen
dc.date.accessioned2019-12-06T15:31:01Z-
dc.date.available2017-06-29T04:22:29Zen
dc.date.available2019-12-06T15:31:01Z-
dc.date.issued2016en
dc.identifier.citationPammu, A. A., Chong, K.-S., & Gwee, B. H. (2016). Highly secured arithmetic hiding based S-Box on AES-128 implementation. 2016 International Symposium on Integrated Circuits (ISIC). (pp. 1-4).en
dc.identifier.urihttps://hdl.handle.net/10356/83739-
dc.description.abstractWe propose an arithmetic hiding technique on Advanced Encryption Standard (AES) algorithm implementation to highly secure the algorithm against Side-Channel Attack (SCA). The arithmetic operations run parallel with Substitution-Box (S-Box) operation of the AES to hide the correlated leakage power dissipation with processed data. There are two key features in our proposed hiding technique. First, the function of the arithmetic hiding is independent with S-Box operation and its power dissipation is dominant over the S-Box. Therefore, the dependency of the total power dissipation with processed data in the AES algorithm is relatively low. Second, the security level of proposed technique against SCA based on Correlation Power Analysis (CPA) and Correlation Electromagnetic Analysis (CEMA) attack are increased by 119× and 63× respectively, compared with unprotected S-Box. This is due to the leakage physical parameters (i.e. power dissipation and EM emanation) which is generated by the arithmetic operation hides the leakage parameters of the S-Box operation. Based on the measurement results on Sakura-X FPGA board, which performs AES-128 algorithm, our proposed technique dissipates 3.8mW and features 1.18× higher power dissipation than the unprotected S-Box implementation. However, our proposed arithmetic hiding technique is highly secured, as the result of CPA and CEMA attack require 38,000 power traces and 44,000 EM traces respectively to reveal the secret key. The required number of traces are significantly higher than the unprotected S-Box, which is only 319 power traces and 691 EM traces respectively to uncover the same secret key.en
dc.description.sponsorshipASTAR (Agency for Sci., Tech. and Research, S’pore)en
dc.format.extent4 p.en
dc.language.isoenen
dc.rights© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/ISICIR.2016.7829736].en
dc.subjectSide-Channel Attacken
dc.subjectArithmetic Hidingen
dc.titleHighly secured arithmetic hiding based S-Box on AES-128 implementationen
dc.typeConference Paperen
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen
dc.contributor.conference2016 International Symposium on Integrated Circuits (ISIC)en
dc.contributor.researchCentre for Integrated Circuits and Systemsen
dc.identifier.doi10.1109/ISICIR.2016.7829736en
dc.description.versionAccepted versionen
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:EEE Conference Papers
Files in This Item:
File Description SizeFormat 
Highly Secured Arithmetic Hiding based S-Box .pdfMain Article529.75 kBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 50

4
Updated on Mar 23, 2023

Page view(s) 20

571
Updated on Mar 29, 2023

Download(s) 50

98
Updated on Mar 29, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.