A Novel Substitution Box Design for humming Bird-2 against Side channel Attack
نویسندگان
چکیده
The side-channel attacks are one of the effortless and commanding attacks against cryptographic implementation and their intention vary from protocols, modules, primitives and system. As a result of this attack, a serious threat to the security of cryptographic module was encountered. In effect, realization of the cryptographic algorithm has to take some countermeasure to resist against this type of attacks. This study presents an efficient S-Box design using Null Conventional Logic (NCL) for Humming Bird-2 which is an ultra lightweight cryptographic algorithm. The recommended architecture was developed using Verilog HDL and implemented on altera cyclone IV E. The results are promising in terms of Area and Degree of Confusion (DOC).
منابع مشابه
Low-Power Side-Channel Attack-Resistant Asynchronous S-Box Design for AES Cryptosystem
A novel asynchronous combinational S-Box (substitution box) design for AES (Advanced Encryption Standard) cryptosystems is proposed and validated. The S Box is considered as the most critical component in AES crypto-circuits since it consumes the most power and leaks the most information against side-channel attacks. The proposed design is based on a delay-insensitive logic paradigm known as Nu...
متن کاملSCARE of Secret Ciphers with SPN Structures
Side-Channel Analysis (SCA) is commonly used to recover secret keys involved in the implementation of publicly known cryptographic algorithms. On the other hand, Side-Channel Analysis for Reverse Engineering (SCARE) considers an adversary who aims at recovering the secret design of some cryptographic algorithm from its implementation. Most of previously published SCARE attacks enable the recove...
متن کاملSecurity analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)
Side-channel attacks are an important class of cryptanalytic techniques against cryptographic implementations and masking is a frequently considered solution to improve the resistance of a cryptographic implementation against side-channel attacks. In this paper, we consequently analyze the security of higher-order Boolean masking schemes in various contexts. Our results are twofold. First, we f...
متن کاملA Block Cipher based PRNG Secure Against Side-Channel Key Recovery
We study the security of a block cipher-based pseudorandom number generator, both in the black box world and in the physical world, separately. We first show that the construction is a secure PRNG in the ideal cipher model. Then, we demonstrate its security against a Bayesian side-channel key recovery adversary. As a main result, we show that our construction guarantees that the success rate of...
متن کاملSecurity of Countermeasures Against State-of-the-Art Differential Scan Attacks
Test compression schemes have been claimed to provide a certain level of security against scan-based side-channel attacks. To mitigate these attacks, a number of scan attack countermeasures are proposed in the literature. Recently, a new differential scan attack (DSA) is proposed which focuses on the S-box outputs rather than the S-box inputs as in previous attacks. In this paper, a systematic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCS
دوره 10 شماره
صفحات -
تاریخ انتشار 2014