22.01.2015 Views

AES Guest Lecturer

AES Guest Lecturer

AES Guest Lecturer

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Attack Precautions<br />

• Avoid use of arrays. Compute values in<br />

SBOX and rCon.<br />

• Design algorithms and devices to work<br />

with constant time intervals. (independent<br />

of key and plaintext.)<br />

– Hidden CPU timing data is a threat.<br />

• Use same memory throughout, Cache is<br />

faster than DRAM<br />

• Compute Key Expansion on the fly.<br />

• Utilize pipelining to stabilize CPU power<br />

consumption.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!