Skip to main content

An Improved DES Anti-DPA Algorithm and Its Automatic Simulation System

  • Conference paper
Book cover System Simulation and Scientific Computing (ICSC 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 327))

Included in the following conference series:

  • 1664 Accesses

Abstract

Based on the analysis of DES cryptographic algorithms and anti-attack strategy, this paper proposes an advanced DES anti-DPA attack algorithm by further improving the Mask method in the power consumption points and the simplicity of working codes. And then, we focus on establishing the algorithm and the validation model by using SystemC, after completing the circuit design of such a DES cryptographic coprocessor that meets the requirement of NFC applications. In order to reduce the development time and costs, we construct a set of automatic simulation system for SystemC model and the RTL circuit. Results of the simulation of this experiment procedure are given to prove the proposed algorithm and design effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ortiz Jr., S.: Is Near-Field Communication Close to Success, 18–20. IEEE Computer Society (March 2006)

    Google Scholar 

  2. Data Encryption Standard. Federal Information Processing Standard (FIPS) Publication 46, National Bureau of Standards. US Department of Commerce, Washington, DC (1977)

    Google Scholar 

  3. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Proceedings of Advances in Cryptography, California, USA, August 15-19, pp. 388–397 (1999)

    Google Scholar 

  4. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  5. Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 150–162. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Jiang, H., Mao, Z.: Advanced DES Algorithm against Differential Power Analysis and its Hardware Implementation. Journal of Computer 27(3), 334–338 (2004)

    Google Scholar 

  7. Li, H., Zhou, Y.: Advanced DES Algorithm against Differential Power Analysis. Communications Technology 40(11), 277–279 (2007)

    Google Scholar 

  8. Han, J., Zeng, X., Tang, T.: VLSI Design of Anti-Attack DES Circuits. Chinese Journal of Semiconductors 26(8), 1646–1652 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, J., Ma, S., Chen, G., Tao, H., Qin, L., Zeng, W. (2012). An Improved DES Anti-DPA Algorithm and Its Automatic Simulation System. In: Xiao, T., Zhang, L., Ma, S. (eds) System Simulation and Scientific Computing. ICSC 2012. Communications in Computer and Information Science, vol 327. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34396-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34396-4_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34395-7

  • Online ISBN: 978-3-642-34396-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics