Title :
Differential Power Analysis of a SHACAL-2 hardware implementation
Author :
Lu, Yingxi ; O´Neill, M.P. ; McCanny, John V.
Author_Institution :
Inst. of Electron., Queen´´s Univ., Belfast
Abstract :
Side-channel attacks (SCA) can be used to reveal the security key stored in cryptographic implementations by monitoring characteristics such as power consumption and subsequently applying statistical analysis techniques. However, cryptographic algorithms, such as SHACAL-2, which do not have any S-Box operations, are more resistant to SCA than algorithms that do contain S-Box operations, such as the S-box computation in DES or AES. In this paper, the advantages of SHACAL-2 in relation to its resistance to differential power analysis (DPA) are outlined. The first reported DPA attack of a SHACAL-2 encryption algorithm FPGA implementation is also presented. Finally, the effect of using different power models in the DPA attack of SHACAL-2 is discussed.
Keywords :
cryptography; field programmable gate arrays; FPGA; S-Box operations; SHACAL-2 hardware implementation; cryptographic implementations; differential power analysis; monitoring characteristics; side-channel attacks; Circuits; Clocks; Cryptography; Energy consumption; Field programmable gate arrays; Hardware; Information analysis; Information security; Information technology; Monitoring;
Conference_Titel :
Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4244-1683-7
Electronic_ISBN :
978-1-4244-1684-4
DOI :
10.1109/ISCAS.2008.4542072