suitable for energy constrained mobile cryptoapplications. It also emits less no ise and has flatter power peaks therefore leaks less information against side-channel attacks(SCA) such as differential power/noise analysis.Analog simulation and power measurement of NCL SBox have been done using Mentor Graphic s EDA (Electronic Design Automation) tools to assure low-power side-channel attack resistant operation of the proposed clock-free AES S-Box. Index Terms- side channel attack,null convention logic(NCL),substituionbox(S-Box),energy consumption, advanced encryption standard (AES). I. INTRODUCTION For a long time, the Data Encryption Standard (DES) wasconsidered as a standard for the symmetric key encryption.DES has a key length of 56 bits. However, this key length is currently considered small and can easily be broken. For this reason, the National Institute of Standards and Technology (NIST) opened a formal call for algorithms in September 1997. A group of fifteen AES candidate algorithms were announced in August 1998. Next, all algorithms were subject to assessment process performed by various groups of cryptographic researchers all over the world. Finally, on October 2, 2000, [1]NIST announced that the Rijndael algorithm was the winner. Rijndael can be specified with key and block sizes in any multiple of 32 bits, with a minimum of 128 bits and a maximum of 256 bits. Therefore, the problem of breaking the key becomes more difficult . In cryptography, the AES is also known as Rijndael . AES has a fixed block size of 128 bits and a key size of 128, 192 or 256 bits. The AES algorithm can be efficiently implemented by hardware and software. The hardware Implementation of the AES essentially has higher reliability than software since it is difficult to be read or modified by the attackers and less prone to reverse engineering.unfortunately AES is still vulnerable to SCAs include simple power analysis (SPA), differential power analysis (DPA),[2] correlation power analysis (CPA) , collision attacks , and leakage power analysis . Among them, DPA and CPA are the most popular andeffective attack that has been reviewed by numerous researchers on various cryptosystems during these years. The goal of counter measures against DPA attacks is to reduce or balance the power consumption. Dual-rail method is the most promising logic style among many countermeasures. The benefit of dual-rail logic is that the constant power consumption can be achieved since the signals are implemented by
two complementary wires. The downside is
dual-rail method generally increase the area and time delay . Another good countermeasure is using asynchronous logic, presents that the power dissipated is independent of the input data in asynchronous logic. In this article, we propose an asynchronous AES S-Box based on a Null Convention Logic (NCL) , which matches the two important properties mentioned above; dualrail encoding and clock-free opera tion. It is intended to achieve low power consumption for mobile applications and con