The Community for Technology Leaders
Computational Intelligence and Design, International Symposium on (2009)
Changsha, Hunan, China
Dec. 12, 2009 to Dec. 14, 2009
ISBN: 978-0-7695-3865-5
pp: 536-539
ABSTRACT
Time randomization method is an effective way to counteract Differential Power Analysis attack. By moving the cryptographic operations randomly in the time domain, this method could provide temporal shift to the power curves. This paper proposed an architecture for time randomization of AES. By randomly inserting registers among cryptographic modules, the architecture could change the physical location of registers through dynamical reconfiguration. The design is realized using Altera’s FPGA. Synthesis, placement and routing of the design have been accomplished on 0.18μm CMOS technology. The result proves that the propagation time of the critical path is 4.57ns. Furthermore, the architecture could effectively counteract Differential Power Analysis.
INDEX TERMS
Differential power analysis; Time randomization; AES
CITATION

K. Liu, J. Xu, W. Yang and Y. Yan, "Research on Time Randomization of AES against Differential Power Analysis," Computational Intelligence and Design, International Symposium on(ISCID), Changsha, Hunan, China, 2009, pp. 536-539.
doi:10.1109/ISCID.2009.280
90 ms
(Ver 3.3 (11022016))