Misc.

2015

Security Simulation against Side-Channel Attacks on Advanced Encryption Standard Circuits Based on Equivalent Circuit Model

2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC)
  • Kengo Iokibe
  • ,
  • Kazuhiro Maeshima
  • ,
  • Tetsushi Watanabe
  • ,
  • Yoshitaka Toyota

First page
224
Last page
229
Language
English
Publishing type
DOI
10.1109/ISEMC.2015.7256163
Publisher
IEEE

An equivalent circuit model was applied to a cryptographic module to simulate the resistance of the module against side-channel attacks. The cryptographic module involved two fiel programmable gate arrays (FPGAs), on which an Advanced Encryption Standard (AES) circuit was implemented on one of them. The equivalent circuit model proposed in the previous literature was improved in terms of the accuracy of model parameters. Resistance against side-channel attacks was simulated in a more practical configuratio with the improved model than that in the previous work. Resistance was simulated with random plaintexts (input values) to the cryptographic circuit, whereas a biased plaintext set was used to simplify simulation. The simulation was carried out with two decoupling configuration for the power distribution network of the FPGA core that the AES circuit was implemented in. The results obtained from simulation confirme that the equivalent circuit model allowed side-channel resistance to be precisely predicted.

Link information
DOI
https://doi.org/10.1109/ISEMC.2015.7256163
Web of Science
https://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=JSTA_CEL&SrcApp=J_Gate_JST&DestLinkType=FullRecord&KeyUT=WOS:000370282300040&DestApp=WOS_CPL
ID information
  • DOI : 10.1109/ISEMC.2015.7256163
  • ISSN : 2158-110X
  • Web of Science ID : WOS:000370282300040

Export
BibTeX RIS