A unified architecture for DPA-resistant PRESENT

Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformation (S-box) and suitable for low cost hardware implementations. Usually, there needs...

Full description

Saved in:
Bibliographic Details
Published in2012 International Conference on Innovations in Information Technology pp. 244 - 248
Main Authors Zhao, Wei, Wang, Yi, Li, Renfa
Format Conference Proceeding
LanguageEnglish
Japanese
Published IEEE 01.03.2012
Subjects
Online AccessGet full text
ISBN9781467311007
1467311006
DOI10.1109/INNOVATIONS.2012.6207741

Cover

Abstract Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformation (S-box) and suitable for low cost hardware implementations. Usually, there needs two 4-bit S-boxes, S p , IS p , for PRESENT encryption and decryption, in which IS p can be computed from S p . Therefore, we proposed a unified architecture to supporting the operations of PRESENT encryption and decryption. There also exists a kind of power analysis attacks pose a serious threat on hardware based PRESENT. In order to resist against DPA, we proposed a new masking scheme for PRESENT, in which the nonlinear substitution needs to be carefully masked. In order to reduce the hardware resources for the proposed masking scheme, we reuse the masked S p to generate masked IS p . The experimental results show that our proposed unified masked PRESENT takes up only one time larger than the unmasked existing design. But, it is obvious that our proposed design has the ability to defend against DPA.
AbstractList Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformation (S-box) and suitable for low cost hardware implementations. Usually, there needs two 4-bit S-boxes, S p , IS p , for PRESENT encryption and decryption, in which IS p can be computed from S p . Therefore, we proposed a unified architecture to supporting the operations of PRESENT encryption and decryption. There also exists a kind of power analysis attacks pose a serious threat on hardware based PRESENT. In order to resist against DPA, we proposed a new masking scheme for PRESENT, in which the nonlinear substitution needs to be carefully masked. In order to reduce the hardware resources for the proposed masking scheme, we reuse the masked S p to generate masked IS p . The experimental results show that our proposed unified masked PRESENT takes up only one time larger than the unmasked existing design. But, it is obvious that our proposed design has the ability to defend against DPA.
Author Zhao, Wei
Wang, Yi
Li, Renfa
Author_xml – sequence: 1
  givenname: Wei
  surname: Zhao
  fullname: Zhao, Wei
  email: estellewy@hotmail.com
  organization: Embedded System and Network Laboratory, Hunan University
– sequence: 2
  givenname: Yi
  surname: Wang
  fullname: Wang, Yi
  email: estellewy@hotmail.com
  organization: Embedded System and Network Laboratory, Hunan University
– sequence: 3
  givenname: Renfa
  surname: Li
  fullname: Li, Renfa
  organization: Embedded System and Network Laboratory, Hunan University
BookMark eNotj1FLwzAUhSMq6GZ_gS_5A633pknTPJY5Z2G0w1VfR9reYEQ7SbsH_72F7Xs5HPg4cBbsZjgOxBhHSBDBPJVVVX8UTVlX-0QAiiQToLXEK7ZAmel0doy5ZpHR-bkjgL5j0Th-wYyGVElxz6Dgp8E7Tz23ofv0E3XTKRB3x8Cfd0UcaPTjZIeJ797W-3XVPLBbZ79Hii65ZO8v62b1Gm_rTbkqtrFHlU2x7FwLUqsedeogJ6FAoOjIdS1JRMqN7bQWzhgrTK9V63IxIxXY3AKpdMkez7ueiA6_wf_Y8He4nEz_AcCBRvQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/INNOVATIONS.2012.6207741
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1467310999
1467311014
9781467310994
9781467311014
EndPage 248
ExternalDocumentID 6207741
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i156t-4cfb0475d173f08e250212cefcbe411e89ac772f99a29d75bf82222450a8a0e53
IEDL.DBID RIE
ISBN 9781467311007
1467311006
IngestDate Wed Aug 27 02:08:47 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
Japanese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i156t-4cfb0475d173f08e250212cefcbe411e89ac772f99a29d75bf82222450a8a0e53
PageCount 5
ParticipantIDs ieee_primary_6207741
PublicationCentury 2000
PublicationDate 2012-03
PublicationDateYYYYMMDD 2012-03-01
PublicationDate_xml – month: 03
  year: 2012
  text: 2012-03
PublicationDecade 2010
PublicationTitle 2012 International Conference on Innovations in Information Technology
PublicationTitleAbbrev INNOVATIONS
PublicationYear 2012
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000703542
Score 1.478879
Snippet Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which...
SourceID ieee
SourceType Publisher
StartPage 244
SubjectTerms CMOS integrated circuits
Computer architecture
Encryption
Field programmable gate arrays
Hardware
Service oriented architecture
Title A unified architecture for DPA-resistant PRESENT
URI https://ieeexplore.ieee.org/document/6207741
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLVKJyZALeKtDIwkdRM7jscKWhWkhg4t6lb5cS1VSClCycLXc52k5SEGpjhRFNmxrXuOfc8xIbfgjXxkykNwsQgZQ56ihMWSSkxMnQHGvFB4lqfTJXta8VWH3O21MABQJ59B5Iv1Xr7dmsovlQ3SmCJaQa5zgMOs0Wrt11P80OU1M_dzP_FOaOnO0qm9F7tMHioHj3n-_NIodX1-Vxy13_5xyEodYyZHZLarXZNa8hpVpY7Mxy_jxv9W_5j0v9R8wXwfp05IB4oeoaOgKjYOAWjwfS8hQAwbPMxHIbJwjyyLMvB9NM4XfbKcjBf307A9PSHcICcrQ2acpkxwOxSJoxkg1sEwZcAZDWw4hEwqg9DaSaliaQXXzmOFmHGqMkWBJ6ekW2wLOCOBNrGg1khmlcYJLzOKFynw5cxarcQ56fnWrt8ag4x129CLvx9fkkP_x5tErivSLd8ruMbIXuqbuks_AdE9nG8
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLWqMsAEqEW8ycBIUjex43isoFULbejQom6Vn1KFlCKULHw913mUhxiY4kRRlBvHOufY514jdGtcIR8eU9_YkPmEgE4RTENLRCrEVhlCXKLwLI3HS_K4oqsWutvlwhhjSvOZCVyzXMvXW1W4qbJeHGJgK6B19gD3Ca2ytXYzKu7npaU2d6M_crXQ4qaoU33OGi8P5r1Jmj6_VLm6zuEVBvXTf2yzUqLM6BDNmverzCWvQZHLQH38Kt343wCOUPcrn8-b75DqGLVM1kF44BXZxgIF9b6vJnjAYr2H-cAHHe64ZZZ7rpeG6aKLlqPh4n7s1_sn-BtQZblPlJWYMKr7LLI4McB2AKiUsUoa0u-bhAsF5NpyLkKuGZXWsYWQUCwSgQ2NTlA722bmFHlShQxrxYkWEoY8TzAcOIObE62lYGeo46Jdv1UlMtZ1oOd_X75B--PFbLqeTtKnC3Tgvn5l67pE7fy9MFeA87m8Lrv3Ez0an7w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+International+Conference+on+Innovations+in+Information+Technology&rft.atitle=A+unified+architecture+for+DPA-resistant+PRESENT&rft.au=Zhao%2C+Wei&rft.au=Wang%2C+Yi&rft.au=Li%2C+Renfa&rft.date=2012-03-01&rft.pub=IEEE&rft.isbn=9781467311007&rft.spage=244&rft.epage=248&rft_id=info:doi/10.1109%2FINNOVATIONS.2012.6207741&rft.externalDocID=6207741
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311007/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311007/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311007/sc.gif&client=summon&freeimage=true