Journal of Artificial Intelligence1994-54502077-2173Asian Network for Scientific Information10.3923/jai.2012.186.192BabuG. Dinesh AnandakumarN. Nalla MuralidharanD. 4201254Even a highly secured algorithm that proves to be mathematically secured has
a possibility to leak secret information, like key, thus stored while implementing
them in hardware platform. This study focuses on the necessity to prevent such
leakage by making some changes in the algorithm in such a way that the functionality
of the algorithm is unaltered thereby assuring the possibility of attacks are
greatly reduced. This study discusses the Field Programmable Gate Array (FPGA)
implementation of the Advanced Encryption Standard (AES) with countermeasures
against Differential Power Analysis (DPA) attacks. The study proposes two different
countermeasure methods: register swapping and random recharging. As a result,
it shows that these countermeasures increase the complexity of attack.]]>Satoh, A.,20072007Satoh, A., S. Morioka, K. Takano and S. Munetoh,20012001pp: 239254Daemen, J. and V. Rijmen,2002Mui, E.N.C.,20072007Kocher, P., J. Jaffe and B. Jun,19981998May, D., H.L. Muller and N.P. Smart,20012001pp: 2838Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan,201212201210