DocumentCode :
1845377
Title :
Differential Power Analysis of a SHACAL-2 hardware implementation
Author :
Lu, Yingxi ; O´Neill, M.P. ; McCanny, John V.
Author_Institution :
Inst. of Electron., Queen´´s Univ., Belfast
fYear :
2008
fDate :
18-21 May 2008
Firstpage :
2933
Lastpage :
2936
Abstract :
Side-channel attacks (SCA) can be used to reveal the security key stored in cryptographic implementations by monitoring characteristics such as power consumption and subsequently applying statistical analysis techniques. However, cryptographic algorithms, such as SHACAL-2, which do not have any S-Box operations, are more resistant to SCA than algorithms that do contain S-Box operations, such as the S-box computation in DES or AES. In this paper, the advantages of SHACAL-2 in relation to its resistance to differential power analysis (DPA) are outlined. The first reported DPA attack of a SHACAL-2 encryption algorithm FPGA implementation is also presented. Finally, the effect of using different power models in the DPA attack of SHACAL-2 is discussed.
Keywords :
cryptography; field programmable gate arrays; FPGA; S-Box operations; SHACAL-2 hardware implementation; cryptographic implementations; differential power analysis; monitoring characteristics; side-channel attacks; Circuits; Clocks; Cryptography; Energy consumption; Field programmable gate arrays; Hardware; Information analysis; Information security; Information technology; Monitoring;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4244-1683-7
Electronic_ISBN :
978-1-4244-1684-4
Type :
conf
DOI :
10.1109/ISCAS.2008.4542072
Filename :
4542072
Link To Document :
بازگشت