Publication Date
2007
Degree Type
Master's Project
Degree Name
Master of Science (MS)
Department
Computer Science
Abstract
Differential power analysis (DPA) side channel attacks have been shown to have great effectiveness in breaking ciphers (such as the Advanced Encryption Standard or AES) that were previously though to be unbreakable. There are currently many methods published that prevent differential power analysis on AES. The method proposed for this project is based on the increased usage of multiprocessors and multicore processors. By using multiple copies of the same AES cipher, a randomly chosen cipher is used to encrypt each plaintext. The other ciphers are then used to obfuscate the data made available to the attacker for DPA in the hope of making DPA impossible or require a statistically large amount of data that it is practically impossible to run successfully.
Recommended Citation
Tran, Richard, "A Differential Power Analysis Resistant Randomized Algorithm using Multiple AES Ciphers" (2007). Master's Projects. 39.
DOI: https://doi.org/10.31979/etd.ehqt-4zmj
https://scholarworks.sjsu.edu/etd_projects/39