FPGA Implementations of the AES Masked Against Power Analysis Attacks

作者: Francesco Regazzoni , Yi Wang , François-Xavier Standaert , None

DOI:

关键词:

摘要: Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. Masking is particularly appealing countermeasure against such since it increases the security to well quantifiable level and can be implemented without modifying underlying technology. Its main drawback performance overhead implies. For example, due prohibitive memory costs, straightforward application masking AES algorithm, with precomputed tables, hardly practical. In this paper, we exploit both increased size state-of-the-art reconfigurable hardware devices previous optimization techniques minimize occupation software S-boxes, in order provide an efficient FPGA implementation masked side-channel attacks. We describe two high throughput architectures, based on 32-bit 128-bit datapaths that suitable Xilinx Virtex-5 devices. way, demonstrate possibility efficiently combine technological advances algorithmic optimizations context.

参考文章(31)
Christof Paar, Jan Pelzl, The Advanced Encryption Standard (AES) Springer, Berlin, Heidelberg. pp. 87- 121 ,(2010) , 10.1007/978-3-642-04101-3_4
Stefan Mangard, Elisabeth Oswald, Thomas Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security) Springer-Verlag New York, Inc.. ,(2007)
Nele Mentens, Ingrid Verbauwhede, Lejla Batina, Bart Preneel, An FPGA Implementation of Rijndael: Trade-offs for side-channel security IFAC Workshop - PDS 2004, Programmable Devices and Systems. pp. 493- 498 ,(2004)
Marc Joye, Pascal Paillier, Berry Schoenmakers, On second-order differential power analysis cryptographic hardware and embedded systems. pp. 293- 308 ,(2005) , 10.1007/11545262_22
Elisabeth Oswald, Kai Schramm, An efficient masking scheme for AES software implementations workshop on information security applications. pp. 292- 305 ,(2005) , 10.1007/11604938_23
Emmanuel Prouff, Matthieu Rivain, A generic method for secure Sbox implementation workshop on information security applications. pp. 227- 244 ,(2007) , 10.1007/978-3-540-77535-5_17
Thomas S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software cryptographic hardware and embedded systems. pp. 238- 251 ,(2000) , 10.1007/3-540-44499-8_19
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen, A side-channel analysis resistant description of the AES s-box fast software encryption. pp. 413- 423 ,(2005) , 10.1007/11502760_28
Elena Trichina, Tymur Korkishko, Secure AES hardware module for resource constrained devices security of ad hoc and sensor networks. pp. 215- 229 ,(2004) , 10.1007/978-3-540-30496-8_18
Louis Goubin, Jacques Patarin, DES and Differential Power Analysis (The Duplication Method) cryptographic hardware and embedded systems. pp. 158- 172 ,(1999) , 10.1007/3-540-48059-5_15