{"title":"Proposal of PingPong-128 Countermeasure against Power Analysis Attack","authors":"Young Jin Kang, Ki-Hwan Kim, H. Lee","doi":"10.23919/ICACT.2019.8702026","DOIUrl":null,"url":null,"abstract":"Typical power analysis attack countermeasures include the ability to inject defensive logic during the hardware gate design phase, or to add additional hardware logic or software coding depending on how the cryptographic module is configured. For example, the Hardware-based high speed cryptographic module via FPGA can be protected with a gate array logic, and the firmware cryptographic module via the microprocessor module will allow you to implement defence technology with software coding. In this paper, Using Scrambler to propose a secure PingPong-128 crypto algorithm for power analysis attacks.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 21st International Conference on Advanced Communication Technology (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICACT.2019.8702026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Typical power analysis attack countermeasures include the ability to inject defensive logic during the hardware gate design phase, or to add additional hardware logic or software coding depending on how the cryptographic module is configured. For example, the Hardware-based high speed cryptographic module via FPGA can be protected with a gate array logic, and the firmware cryptographic module via the microprocessor module will allow you to implement defence technology with software coding. In this paper, Using Scrambler to propose a secure PingPong-128 crypto algorithm for power analysis attacks.