DocumentCode :
3011810
Title :
Side channel attack prevention for AES smart card
Author :
Rahaman, Mohammad Zahiduf ; Hossain, Mohammad Akram
fYear :
2008
fDate :
24-27 Dec. 2008
Firstpage :
376
Lastpage :
380
Abstract :
This paper describes an AES smart card implementation highly tamper resistant to side channel attacks. Smart cards are gaining popularity in applications that require high security and store sensitive information. Modern smart cards, highly capable of complicated cryptology, provide a high assurance of tamper resistance and thus commonly used in payment application. Although advanced smart cards can not protect attackers from being defrauded by different side channel attacks. Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to side-channel attacks (SCAs). We describe the development of differential power attacks and describe how to perform differential power kind of side-channel attack on an AES implementation, using simulated power traces. We also discusses the security prevention from such corresponding attacks, such as randomized masking techniques for software implementations.
Keywords :
authorisation; cryptography; smart cards; AES smart card; embedded integrated circuit; payment application; randomized masking technique; side channel attack prevention; simulated power trace; tamper resistance; Application software; Circuit simulation; Cryptography; Energy consumption; Hardware; Information analysis; Information security; Information technology; Protection; Smart cards; AES; DPA; DPA prevention; SCA; cryptanalysis; power consumption model;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Technology, 2008. ICCIT 2008. 11th International Conference on
Conference_Location :
Khulna
Print_ISBN :
978-1-4244-2135-0
Electronic_ISBN :
978-1-4244-2136-7
Type :
conf
DOI :
10.1109/ICCITECHN.2008.4802973
Filename :
4802973
Link To Document :
بازگشت