A Secure Asynchronous Hardware Implementation Of DES Cryptography Algorithm
نویسندگان
چکیده
QDI Dual-rail asynchronous circuits, if implemented carefully balanced, have natural and efficient resistance to side-channel attacks in cryptography applications. Due to hardware redundancy in previous balanced gate designs, there are many faults which can make them imbalanced without causing logical errors. Therefore, traditional logical testing methods are unable to test and verify if a gate is completely fault-free and hence balanced. This vulnerability opens the possibility of new methods of attacks, based on a combination of fault and power attacks in cryptographic applications. In this paper we present an asynchronous approach to hardware implementation of DES cryptography algorithm that countermeasures against this new multiple side-channel attack.
منابع مشابه
An Automatic Design Flow for Implementation of Side Channel Attacks Resistant Crypto-Chips
Recently, it has been proven that asynchronous circuits possess considerable inherent countermeasure against side channel attacks. In spite of these systems' advantages for immune cryptography, because of the lack of automatic design tools and standard methods, exploiting such schemes faces difficulties. In this paper, a fully automated secure design flow and a set of secure library cells resis...
متن کاملImplementation of Cryptography Architecture with High Secure Core
The continuous increase in demand for security in electronic systems and communication systems which lacks a secure architecture has resulted in the need to provide cryptography architecture with high secure core. The hardware implementation of the cryptography core which incorporates multiple algorithm for security purpose was already developed but if the architecture is capable of switching b...
متن کاملAn EDA tool for implementation of low power and secure crypto-chips
Regarding the significant mathematical immunity of recent cryptographic algorithms, attacks considering the physical aspects of these algorithms, known as side channel attacks, have received much of interest. Today, it is quite clear that asynchronous circuits possess considerable inherent countermeasure capabilities against side channel attacks, and therefore they are more immune for cryptogra...
متن کاملCryptographic Model for Secure Communication on Fpga Using 32-bit Arithmetic Logic Unit and Minimized Hardware Requirement in Complex Data Encryption Algorithm
Security in networking is based on cryptography, the science and art of transforming messages to make them secure and immune to attack. Cryptography can provide confidentiality, integrity, authentication of message. Cryptography can also provide entity authentication. However, cryptographic algorithms impose tremendous processing power demands that can be a bottleneck in high-speed networks. Th...
متن کاملA Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008