A unified architecture for DPA-resistant PRESENT
Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformation (S-box) and suitable for low cost hardware implementations. Usually, there needs...
Saved in:
Published in | 2012 International Conference on Innovations in Information Technology pp. 244 - 248 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English Japanese |
Published |
IEEE
01.03.2012
|
Subjects | |
Online Access | Get full text |
ISBN | 9781467311007 1467311006 |
DOI | 10.1109/INNOVATIONS.2012.6207741 |
Cover
Abstract | Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformation (S-box) and suitable for low cost hardware implementations. Usually, there needs two 4-bit S-boxes, S p , IS p , for PRESENT encryption and decryption, in which IS p can be computed from S p . Therefore, we proposed a unified architecture to supporting the operations of PRESENT encryption and decryption. There also exists a kind of power analysis attacks pose a serious threat on hardware based PRESENT. In order to resist against DPA, we proposed a new masking scheme for PRESENT, in which the nonlinear substitution needs to be carefully masked. In order to reduce the hardware resources for the proposed masking scheme, we reuse the masked S p to generate masked IS p . The experimental results show that our proposed unified masked PRESENT takes up only one time larger than the unmasked existing design. But, it is obvious that our proposed design has the ability to defend against DPA. |
---|---|
AbstractList | Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformation (S-box) and suitable for low cost hardware implementations. Usually, there needs two 4-bit S-boxes, S p , IS p , for PRESENT encryption and decryption, in which IS p can be computed from S p . Therefore, we proposed a unified architecture to supporting the operations of PRESENT encryption and decryption. There also exists a kind of power analysis attacks pose a serious threat on hardware based PRESENT. In order to resist against DPA, we proposed a new masking scheme for PRESENT, in which the nonlinear substitution needs to be carefully masked. In order to reduce the hardware resources for the proposed masking scheme, we reuse the masked S p to generate masked IS p . The experimental results show that our proposed unified masked PRESENT takes up only one time larger than the unmasked existing design. But, it is obvious that our proposed design has the ability to defend against DPA. |
Author | Zhao, Wei Wang, Yi Li, Renfa |
Author_xml | – sequence: 1 givenname: Wei surname: Zhao fullname: Zhao, Wei email: estellewy@hotmail.com organization: Embedded System and Network Laboratory, Hunan University – sequence: 2 givenname: Yi surname: Wang fullname: Wang, Yi email: estellewy@hotmail.com organization: Embedded System and Network Laboratory, Hunan University – sequence: 3 givenname: Renfa surname: Li fullname: Li, Renfa organization: Embedded System and Network Laboratory, Hunan University |
BookMark | eNotj1FLwzAUhSMq6GZ_gS_5A633pknTPJY5Z2G0w1VfR9reYEQ7SbsH_72F7Xs5HPg4cBbsZjgOxBhHSBDBPJVVVX8UTVlX-0QAiiQToLXEK7ZAmel0doy5ZpHR-bkjgL5j0Th-wYyGVElxz6Dgp8E7Tz23ofv0E3XTKRB3x8Cfd0UcaPTjZIeJ797W-3XVPLBbZ79Hii65ZO8v62b1Gm_rTbkqtrFHlU2x7FwLUqsedeogJ6FAoOjIdS1JRMqN7bQWzhgrTK9V63IxIxXY3AKpdMkez7ueiA6_wf_Y8He4nEz_AcCBRvQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/INNOVATIONS.2012.6207741 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1467310999 1467311014 9781467310994 9781467311014 |
EndPage | 248 |
ExternalDocumentID | 6207741 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i156t-4cfb0475d173f08e250212cefcbe411e89ac772f99a29d75bf82222450a8a0e53 |
IEDL.DBID | RIE |
ISBN | 9781467311007 1467311006 |
IngestDate | Wed Aug 27 02:08:47 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English Japanese |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i156t-4cfb0475d173f08e250212cefcbe411e89ac772f99a29d75bf82222450a8a0e53 |
PageCount | 5 |
ParticipantIDs | ieee_primary_6207741 |
PublicationCentury | 2000 |
PublicationDate | 2012-03 |
PublicationDateYYYYMMDD | 2012-03-01 |
PublicationDate_xml | – month: 03 year: 2012 text: 2012-03 |
PublicationDecade | 2010 |
PublicationTitle | 2012 International Conference on Innovations in Information Technology |
PublicationTitleAbbrev | INNOVATIONS |
PublicationYear | 2012 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000703542 |
Score | 1.478879 |
Snippet | Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 244 |
SubjectTerms | CMOS integrated circuits Computer architecture Encryption Field programmable gate arrays Hardware Service oriented architecture |
Title | A unified architecture for DPA-resistant PRESENT |
URI | https://ieeexplore.ieee.org/document/6207741 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLVKJyZALeKtDIwkdRM7jscKWhWkhg4t6lb5cS1VSClCycLXc52k5SEGpjhRFNmxrXuOfc8xIbfgjXxkykNwsQgZQ56ihMWSSkxMnQHGvFB4lqfTJXta8VWH3O21MABQJ59B5Iv1Xr7dmsovlQ3SmCJaQa5zgMOs0Wrt11P80OU1M_dzP_FOaOnO0qm9F7tMHioHj3n-_NIodX1-Vxy13_5xyEodYyZHZLarXZNa8hpVpY7Mxy_jxv9W_5j0v9R8wXwfp05IB4oeoaOgKjYOAWjwfS8hQAwbPMxHIbJwjyyLMvB9NM4XfbKcjBf307A9PSHcICcrQ2acpkxwOxSJoxkg1sEwZcAZDWw4hEwqg9DaSaliaQXXzmOFmHGqMkWBJ6ekW2wLOCOBNrGg1khmlcYJLzOKFynw5cxarcQ56fnWrt8ag4x129CLvx9fkkP_x5tErivSLd8ruMbIXuqbuks_AdE9nG8 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLWqMsAEqEW8ycBIUjex43isoFULbejQom6Vn1KFlCKULHw913mUhxiY4kRRlBvHOufY514jdGtcIR8eU9_YkPmEgE4RTENLRCrEVhlCXKLwLI3HS_K4oqsWutvlwhhjSvOZCVyzXMvXW1W4qbJeHGJgK6B19gD3Ca2ytXYzKu7npaU2d6M_crXQ4qaoU33OGi8P5r1Jmj6_VLm6zuEVBvXTf2yzUqLM6BDNmverzCWvQZHLQH38Kt343wCOUPcrn8-b75DqGLVM1kF44BXZxgIF9b6vJnjAYr2H-cAHHe64ZZZ7rpeG6aKLlqPh4n7s1_sn-BtQZblPlJWYMKr7LLI4McB2AKiUsUoa0u-bhAsF5NpyLkKuGZXWsYWQUCwSgQ2NTlA722bmFHlShQxrxYkWEoY8TzAcOIObE62lYGeo46Jdv1UlMtZ1oOd_X75B--PFbLqeTtKnC3Tgvn5l67pE7fy9MFeA87m8Lrv3Ez0an7w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+International+Conference+on+Innovations+in+Information+Technology&rft.atitle=A+unified+architecture+for+DPA-resistant+PRESENT&rft.au=Zhao%2C+Wei&rft.au=Wang%2C+Yi&rft.au=Li%2C+Renfa&rft.date=2012-03-01&rft.pub=IEEE&rft.isbn=9781467311007&rft.spage=244&rft.epage=248&rft_id=info:doi/10.1109%2FINNOVATIONS.2012.6207741&rft.externalDocID=6207741 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311007/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311007/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311007/sc.gif&client=summon&freeimage=true |