Affiliation:
1. Islamic Azad University
Abstract
Differential power analysis (DPA) attack is an important threat that researchers spend great effort to make crypto algorithms resistant against DPA attacks. In order to determine whether the hardware has DPA leakage before manufacturing, an accurate power model in digital simulation has been generated. FPGAs Arrays are attractive options for hardware implementation of encryption algorithms. In this paper, we show generated power model by using integer numbers whole DES’s rounds vs. S-Box alone, and this method gives more realistic results to determine the effectiveness of the improvements protect whole DES rather than in which only informer elements in the DES round. In particular this allows the user to isolate some parts of its implementation in order to analyze information leakages directly linked to them. We review s-box because it’s get 2kbit or 20% CLB slice from FPGA to implement DES or TDES. This paper try to identify role of Sbox in DPA.
Publisher
Trans Tech Publications, Ltd.
Reference11 articles.
1. Wiener, M.J., Efficient DES Key Search", School of Computer Science, arleton University, Ottawa, Canada, TR-244, May 1994. Presented at the Rump Session of Crypto '93. [Reprinted in "Practical Cryptography for Data Internetworks, W. Stallings, editor, IEEE Computer Society Press, pp.31-79, (1996).
2. Gael, R; Francois-Xavier, S; UCL Crypto Group, Louvain-la-Neuve . Electro technical Conference, 2002. MELECON 2002. 11th Mediterranean . Issue Date: 2002 . On page(s): 209 – 214.
3. Yan-Ha, Hea-Sook Park, Soon-Mi Lee, Young-Whan Park and Young-Shin Han. Design and Implementation of SMS Security System for Wireless Environment. Knowledge-Based Intelligent Information and Engineering Systems . Lecture Notes in Computer Science, 2005, Volume 3682/2005, 161, DOI: 10. 1007/11552451_147.
4. Thomas Wollinger , Jorge Guajardo, Christof Paar . ACM Special Issue Security and Embedded Systems Vol. No. March 2003, Pages ACM Transactions on Embedded Computing Systems (TECS) TECS Homepage table of contents archive . Volume 3 Issue 3, August 2004. Pages 534 – 574. Publisher ACM New York, NY, USA.
5. F. -X. Standaert, S.B. Ors, J. -J. Quisquater, B. Preneel. Power Analysis Attacks against FPGA Implementations of the DES. proceedings of FPL 2004, Lecture Notes in Computer Science, vol 3203, pp.84-94, Antwerp, Belgium, September (2004).