Downloads: 112 | Views: 262
Survey Paper | Electronics & Communication Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 7 / 10
Review on Various Methods Used for Secure Data Transfer
Anagha A, Gnana Sheela K
Abstract: In the modern world secure data transfer and privacy is becoming a major problem. Smart cards and other embedded devices use an encryption technology for secure data transfer. If a person want to obtain the secret data that is encrypted within these cards he can obtain it by measuring the power supply current of such device while it is performing an encryption and carefully analyzing it mathematically. In this paper a new technology is presented to increase the security by at least two orders of magnitude and with negligible performance degradation. It is accomplished by redistributing the charge stored in internal nodes and thus, removing memory effects that represent a significant threat to security. The first attack on smart cards has been reported in 1999 and since then various researches are going on how to implement a secure data transfer. In this paper a novel complete methodology for removing internal charges in any gate of any differential logic style is discussed. It is proving suitability for secure implementation designing and simulating different digital gates. A method for performing simulation based DPA attacks on the substitution box of the Kasumi algorithm to assess the proposal is also explained. The paper also discussed about the effect of temperature variations on the security of the proposal against DPA attacks.
Keywords: Differential Power Analysis DPA, Homogeneous Dual-Rail Logic HDRL, Power Consumption, Side-Channel Attacks
Edition: Volume 3 Issue 11, November 2014
Pages: 675 - 678
Make Sure to Disable the Pop-Up Blocker of Web Browser