A Processor for ARX - Based Cryptography Algorithm with Side Channel Protection

Authors(2) :-Mrs. Gopagoni Sandhya, Dr. S. Lakshmi

Arithmetic operations like addition, rotation, and logical operations exceptional or are the handiest elements for cryptographic algorithms which deploy on ARX. These are grouped to ensure passable confusion and diffusion homes. While ARX ciphers can undoubtedly be secured towards timing attacks, exquisite measures like protecting need to be thinking about a selected end goal to stop power and electromagnetic evaluation. This study affords processor architecture for ARX based cryptography that inherently guarantees first-arrange SCA opposition of any actualized calculation. This is carried out by making sure the whole facts way utilizing a Boolean concealing plan with three offers. We verify our safety asserts by way of mapping an ARX-calculation to the proposed architectures and utilizing the ordinary spillage reputation gadget in light of Student's t-check to make certain the aspect-channel competition of our processor.

Authors and Affiliations

Mrs. Gopagoni Sandhya
Ph.D Scholar, Department of ECE, Sathyabama University, Jeppiaar Nagar, Chennai, Tamilnadu, India
Dr. S. Lakshmi
Professor, Department of ECE, Sathyabama University, Jeppiaar Nagar Chennai, Tamil Nadu, India

ARK, cryptography, rotational cryptanalysis.

  1. R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, "The SIMON and SPECK Families of Lightweight Block Ciphers.," IACR Cryptology ePrint Archive, vol. 2013, p. 404, 2013.
  2. A. Moradi, A. Poschmann, S. Ling, C. Paar, and H. Wang, "Pushing the Limits: A Very Compact and a Threshold Implementation of AES," in Advances in Cryptology — EUROCRYPT 2011 (K. G. Paterson, ed.), vol. 6632 of Springer LNCS, pp. 69–88, 2011.
  3. A. Aysu, E. Gulcan, and P. Schaumont, "SIMON Says: Break Area Records of Block Ciphers on FPGAs," Embedded Systems Letters, IEEE, vol. 6, pp. 37–40, June 2014.
  4. T. Good and M. Benaissa, "AES on FPGA from the Fastest to the Smallest," in Cryptographic Hardware and Embedded Systems CHES 2005 (J. Rao and B. Sunar, eds.), vol. 3659 of Springer LNCS, pp. 427–440, 2005.
  5. P. Yalla and J. Kaps, "Lightweight Cryptography for FPGAs," in International Conference on Reconfigurable Computing and FPGAs, 2009. ReConFig ’09., pp. 225–230, Dec 2009.
  6. S. Bhasin, T. Graba, J.-L. Danger, and Z. Najm, "A look into SIMON from a sidechannel perspective," in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014, pp. 56–59, May 2014.
  7. D. Shanmugam, R. Selvam, and S. Annadurai, "Differential Power Analysis Attack on SIMON and LED Block Ciphers," in Security, Privacy, and Applied Cryptography Engineering (R. Chakraborty, V. Matyas, and P. Schaumont, eds.), vol. 8804 of Springer LNCS, pp. 110–125, 2014.
  8. S. Nikova, C. Rechberger, and V. Rijmen, "Threshold Implementations Against Side-Channel Attacks and Glitches," in Information and Communications Security (P. Ning, S. Qing, and N. Li, eds.), vol. 4307 of Springer LNCS, pp. 529–545, 2006.
  9. B. Mazumdar, S. S. Ali, and O. Sinanoglu, "Power analysis attacks on ARX: an application to Salsa20," in IOLTS, pp. 40–43, IEEE, 2015.
  10. N. Veyrat-Charvillon, M. Medwed, S. Kerckhof, and F. Standaert, "Shuffling against side-channel attacks: A comprehensive study with cautionary note," in ASIACRYPT, vol. 7658 of Lecture Notes in Computer Science, pp. 740–757, Springer, 2012.
  11. E. Prouff and M. Rivain, "Masking against side channel attacks: A formal security proof," in EUROCRYPT, vol. 7881 of Lecture Notes in Computer Science, pp. 142–159, Springer, 2013.
  12. S. Mangard, N. Pramstaller, and E. Oswald, "Successfully attacking masked AES hardware implementations," in CHES, vol. 3659 of Lecture Notes in Computer Science, pp. 157–171, Springer, 2005.
  13. A. Poschmann, A. Moradi, K. Khoo, C. Lim, H. Wang, and S. Ling, "Side-channel resistant crypto for less than 2, 300 GE," J. Cryptology, vol. 24, no. 2, pp. 322–345, 2011.

Publication Details

Published in : Volume 3 | Issue 3 | May-June 2017
Date of Publication : 2017-05-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 773-779
Manuscript Number : IJSRSET184946
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Mrs. Gopagoni Sandhya, Dr. S. Lakshmi, " A Processor for ARX - Based Cryptography Algorithm with Side Channel Protection, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 3, pp.773-779, May-June-2017.
Journal URL : http://ijsrset.com/IJSRSET184946

Article Preview

Follow Us

Contact Us