By Topic

A Comprehensive Design Method Based on WDDL and Dynamic Cryptosystem to Resist DPA Attack

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yuyu Zhang ; Comput. Sch., Wuhan Univ., Wuhan, China ; Guoxi Wang ; Yufeng Ma ; Jingwen Li

In this paper, we present a novel multi-level design method to secure encryption algorithms against DPA attack. Generally, DPA-resistant methods can be mainly divided into two levels: software and hardware. Software-based countermeasures are relatively cheaper to put in place, while hardware-based methods counteract DPA at a lower level and achieve better countermeasure effectiveness. Taking both the cost and the level of security into consideration, we combine the technique of WDDL and dynamic cryptosystem, and propose a comprehensive DPA countermeasure on both the algorithmic and the logic level. The dynamic cryptosystem considerably increases the attack complexity, and meanwhile we utilize WDDL to balance the leakage of power consumption. In this way, DPA attack can be effectively resisted at acceptable cost.

Published in:

Intelligence Science and Information Engineering (ISIE), 2011 International Conference on

Date of Conference:

20-21 Aug. 2011