Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Countermeasure techniques for seed hardware modules against differential power analysis

Authors
Kim, YongminLee, Jae SeongKim, Dong Kyue
Issue Date
Dec-2010
Publisher
IEEE
Keywords
Differential power analysis; Power analysis attack; SEED; Side channel attack
Citation
Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010, pp.763 - 767
Indexed
SCOPUS
Journal Title
Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010
Start Page
763
End Page
767
URI
https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/173315
DOI
10.1109/ICNIDC.2010.5657883
ISSN
0000-0000
Abstract
SEED, the Korean standard block cipher algorithm, is a 128-bit symmetric key block cipher algorithm. Although SEED is theoretically safe, cryptographic devices with SEED modules are vulnerable to differential power analysis due to leakage information. Recently, differential power analysis has been widely researched, and various countermeasure techniques against differential power analysis have been proposed. In this paper, we embodied SEED hardware modules with differential power analysis countermeasure techniques using masking methods, and we generated random number using simple PRNG module. We embodied the SEED hardware modules using VHDL, and analyzed the result of simulation and synthesis.
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Dong Kyue photo

Kim, Dong Kyue
COLLEGE OF ENGINEERING (SCHOOL OF ELECTRONIC ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE