{"title":"AES算法抗DPA攻击的高效实现","authors":"A. Amaar, I. Ashour, M. Shiple","doi":"10.1109/UKSim.2012.110","DOIUrl":null,"url":null,"abstract":"This paper presents a highly efficient AES algorithm resistant to differential power analysis (DPA). This paper conducts a simulation based correlation power analysis (CPA) attack on AES implementation with different structures. The proposed idea does not affect the working frequency and does not alter the algorithm core architecture. A minimal overhead hardware is used to manage the dataflow of plaintext and noise.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Efficient Implementation of AES Algorithm Immune to DPA Attack\",\"authors\":\"A. Amaar, I. Ashour, M. Shiple\",\"doi\":\"10.1109/UKSim.2012.110\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a highly efficient AES algorithm resistant to differential power analysis (DPA). This paper conducts a simulation based correlation power analysis (CPA) attack on AES implementation with different structures. The proposed idea does not affect the working frequency and does not alter the algorithm core architecture. A minimal overhead hardware is used to manage the dataflow of plaintext and noise.\",\"PeriodicalId\":405479,\"journal\":{\"name\":\"2012 UKSim 14th International Conference on Computer Modelling and Simulation\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 UKSim 14th International Conference on Computer Modelling and Simulation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UKSim.2012.110\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UKSim.2012.110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient Implementation of AES Algorithm Immune to DPA Attack
This paper presents a highly efficient AES algorithm resistant to differential power analysis (DPA). This paper conducts a simulation based correlation power analysis (CPA) attack on AES implementation with different structures. The proposed idea does not affect the working frequency and does not alter the algorithm core architecture. A minimal overhead hardware is used to manage the dataflow of plaintext and noise.