You are on page 1of 2

Box provides considerable benefits over existing

designs since it consumes less power therefore


suitable for energy constrained mobile cryptoapplications. It also emits less no
ise and has flatter
power peaks therefore leaks less information
against side-channel attacks(SCA) such as
differential power/noise analysis.Analog
simulation and power measurement of NCL SBox have been done using Mentor Graphic
s EDA
(Electronic Design Automation) tools to assure
low-power side-channel attack resistant operation
of the proposed clock-free AES S-Box.
Index Terms- side channel attack,null convention
logic(NCL),substituionbox(S-Box),energy
consumption, advanced encryption standard
(AES).
I. INTRODUCTION
For a long time, the Data Encryption Standard
(DES) wasconsidered as a standard for the
symmetric key encryption.DES has a key length
of 56 bits. However, this key length is currently
considered small and can easily be broken. For
this reason, the National Institute of Standards
and Technology (NIST) opened a formal call for
algorithms in September 1997. A group of
fifteen AES candidate algorithms were
announced in August 1998. Next, all algorithms
were subject to assessment process performed by
various groups of cryptographic researchers all
over the world. Finally, on October 2, 2000,
[1]NIST announced that the Rijndael algorithm
was the winner. Rijndael can be specified with
key and block sizes in any multiple of 32 bits,
with a minimum of 128 bits and a maximum of
256 bits. Therefore, the problem of breaking the
key becomes more difficult . In cryptography,
the AES is also known as Rijndael . AES has a
fixed block size of 128 bits and a key size of
128, 192 or 256 bits. The AES algorithm can be
efficiently implemented by hardware and
software.
The hardware Implementation of the AES
essentially has higher reliability than software
since it is difficult to be read or modified by the
attackers and less prone to reverse
engineering.unfortunately AES is still vulnerable
to SCAs include simple power analysis (SPA),
differential power analysis (DPA),[2] correlation
power analysis (CPA) , collision attacks , and
leakage power analysis . Among them, DPA and
CPA are the most popular andeffective attack
that has been reviewed by numerous researchers
on various cryptosystems during these years.
The goal of counter measures against DPA
attacks is to reduce or balance the power
consumption. Dual-rail method is the most
promising logic style among many
countermeasures. The benefit of dual-rail logic is
that the constant power consumption can be
achieved since the signals are implemented by

two complementary wires. The downside is


dual-rail method generally increase the area and
time delay . Another good countermeasure is
using asynchronous logic, presents that the
power dissipated is independent of the input data
in asynchronous logic. In this article, we propose
an asynchronous AES S-Box based on a Null
Convention Logic (NCL) , which matches the
two important properties mentioned above; dualrail encoding and clock-free opera
tion. It is
intended to achieve low power consumption for
mobile applications and con

You might also like