2019
DOI: 10.1016/j.vlsi.2019.06.005
|View full text |Cite
|
Sign up to set email alerts
|

A simulated approach to evaluate side-channel attack countermeasures for the Advanced Encryption Standard

Abstract: Modern networks have critical security needs and a suitable level of protection and performance is usually achieved with the use of dedicated hardware cryptographic cores. Although the Advanced Encryption Standard (AES) is considered the best approach when symmetric cryptography is required, one of its main weaknesses lies in its measurable power consumption. Side-Channel Attacks (SCAs) use this emitted power to analyse and revert the mathematical steps and extract the encryption key. Nowadays they exist sever… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…In Equation (10), B is the number of transmitted/received information bits, i.e., the information block size parameter defined in [1,4] for the different MODCODs. In other words, it represents the data payload size in bits for each transmitted/received codeword.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In Equation (10), B is the number of transmitted/received information bits, i.e., the information block size parameter defined in [1,4] for the different MODCODs. In other words, it represents the data payload size in bits for each transmitted/received codeword.…”
Section: Resultsmentioning
confidence: 99%
“…In fact, this MODCOD is the one with the largest information block size among the MODCODs of CCSDS 131.2-B-1, which is B = 43,678 bits. According to Equation (10), the corresponding calculation is (1/129,920)• 43,678 •16 ≈ 5.38. Similarly, MODCOD 37, defined in CCSDS 131.21-O-1, is characterized by an information block size B = 60,510; hence, the corresponding throughput for 1 Gbaud is 7.45 Gbps.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the systematic approach used in this work allows us to easily extend the analysis (and the hardware implications) to the inverse transformations of the AES decryption algorithm for implementing decryption-only modules or encryption/decryption modules, and to AES modules supporting also (or only) 192-bit keys (12 rounds) and (or) 256-bit keys (14 rounds). Future works will the evaluation of the effects on the resistance to the Side-Channel attacks due to the application of the isomorphic mapping to the linear operations of AES, according to the methodology presented in [14].…”
Section: Discussionmentioning
confidence: 99%
“…Evaluations of cipher suites should consider their resilience against various SCAs, with some implementations incorporating countermeasures like constant-time algorithms or randomization. This comprehensive approach ensures robust protection against theoretical cryptographic vulnerabilities and practical implementationlevel weaknesses [43,44].…”
mentioning
confidence: 99%