Dissertation > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption

DPA Resistant Hardware Implementation of AES Based on Random Masking

Author LiuHaiQing
Tutor LuHongYi
School National University of Defense Science and Technology
Course Computer Science and Technology
Keywords AES Random mask DPA Finite field Effective realization
CLC TP309.7
Type Master's thesis
Year 2008
Downloads 147
Quotes 2
Download Dissertation

With AES to replace DES as a new generation of the Data Encryption Standard , AES is more and more widely in the field of security , for AES, a variety of malicious attacks are becoming more serious . Called power attacks bypass attack techniques has posed a huge threat to the AES . Therefore , the study of the anti -power attack AES protection technology has important theoretical significance and practical value . In this paper, based on related research , in-depth study of the principles of power attacks ; given an AES effective implementation ; based on the effective realization of proposed anti DPA attack protection solution based on a random mask AES ; this on the basis of resistance to DPA attacks hardware -based a random mask the AES . ( 1) study the principle of power attacks and anti -power attack techniques . Analysis of the principles of power attacks , can be more in-depth understanding of the weak links of the anti -power attack of the AES algorithm , the basis of study of the anti -power attack protection technology . (2) gives an effective implementation of the AES . Only nonlinear transformation in the AES - SubBytes transformation in the finite field GF (2 ~ 8) the inverse transition to the finite field GF (2 ~ 4) and on GF (2 ~ 2) , effectively reducing the hardware overhead , this effective program is also based on the basis of the a random mask AES protection technology . (3) proposed a random mask AES anti - DPA Attack protective technology program . Based on the effective implementation of AES , AES mask protection key - the finite field GF (2 ~ 8) byte mask to seek reversal replaced finite field GF (2 ~ 4) and GF (2 ~ 2) on a series of masked , effectively mask the AES protection . The theoretical analysis shows that all the intermediate results are hidden, to achieve the purpose of the anti- DPA attacks . ( 4) based the random mask AES against DPA attacks hardware implementation . The paper mask protection AES coprocessor - Masked AES and AES coprocessor mask protection - Unmasked AES . Compared Unmasked AES Masked AES decline in the performance of the chip area , maximum frequency , throughput , etc. , but the anti- DPA attack , enhanced safety performance .

Related Dissertations
More Dissertations