International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Survey Paper | Electronics & Communication Engineering | India | Volume 3 Issue 11, November 2014


Review on Various Methods Used for Secure Data Transfer

Anagha A | Gnana Sheela K [3]


Abstract: In the modern world secure data transfer and privacy is becoming a major problem. Smart cards and other embedded devices use an encryption technology for secure data transfer. If a person want to obtain the secret data that is encrypted within these cards he can obtain it by measuring the power supply current of such device while it is performing an encryption and carefully analyzing it mathematically. In this paper a new technology is presented to increase the security by at least two orders of magnitude and with negligible performance degradation. It is accomplished by redistributing the charge stored in internal nodes and thus, removing memory effects that represent a significant threat to security. The first attack on smart cards has been reported in 1999 and since then various researches are going on how to implement a secure data transfer. In this paper a novel complete methodology for removing internal charges in any gate of any differential logic style is discussed. It is proving suitability for secure implementation designing and simulating different digital gates. A method for performing simulation based DPA attacks on the substitution box of the Kasumi algorithm to assess the proposal is also explained. The paper also discussed about the effect of temperature variations on the security of the proposal against DPA attacks.


Keywords: Differential Power Analysis DPA, Homogeneous Dual-Rail Logic HDRL, Power Consumption, Side-Channel Attacks


Edition: Volume 3 Issue 11, November 2014,


Pages: 675 - 678


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Anagha A, Gnana Sheela K, "Review on Various Methods Used for Secure Data Transfer", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 675-678, https://www.ijsr.net/get_abstract.php?paper_id=OCT14922

Similar Articles with Keyword 'Power Consumption'

Downloads: 195 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Electronics & Communication Engineering, India, Volume 4 Issue 10, October 2015

Pages: 188 - 191

Realization of Smart City Using 5G Cognitive Radio

Lalit Chettri | Syed Sazad [2]

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 12 Issue 5, May 2023

Pages: 844 - 850

Macro Modelling Approach in Power Aware Scheduling

Dr. Dileep P.

Share this Article
Top