Countermeasure techniques for seed hardware modules against differential power analysis
- Authors
- Kim, Yongmin; Lee, Jae Seong; Kim, Dong Kyue
- Issue Date
- Dec-2010
- Publisher
- IEEE
- Keywords
- Differential power analysis; Power analysis attack; SEED; Side channel attack
- Citation
- Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010, pp.763 - 767
- Indexed
- SCOPUS
- Journal Title
- Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010
- Start Page
- 763
- End Page
- 767
- URI
- https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/173315
- DOI
- 10.1109/ICNIDC.2010.5657883
- ISSN
- 0000-0000
- Abstract
- SEED, the Korean standard block cipher algorithm, is a 128-bit symmetric key block cipher algorithm. Although SEED is theoretically safe, cryptographic devices with SEED modules are vulnerable to differential power analysis due to leakage information. Recently, differential power analysis has been widely researched, and various countermeasure techniques against differential power analysis have been proposed. In this paper, we embodied SEED hardware modules with differential power analysis countermeasure techniques using masking methods, and we generated random number using simple PRNG module. We embodied the SEED hardware modules using VHDL, and analyzed the result of simulation and synthesis.
- Files in This Item
-
Go to Link
- Appears in
Collections - 서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.