Skip to main content
Log in

Protecting AES against side-channel analysis using wire-tap codes

  • Regular Paper
  • Published:
Journal of Cryptographic Engineering Aims and scope Submit manuscript

Abstract

We introduce a general protection of data against side channel analysis (SCA) based on wire-tap codes. We focus in this paper on an application for the AES cipher. We analyse the behaviour of our countermeasure against different kinds of SCA. Our results show that this protection is an excellent alternative to classical masking methods as it comes with the secrecy property of wire-tap coding, practical resistance against first and second-order DPA. Moreover, we point out that it brings two novel features: the possibility to unmask without the knowledge of the mask and its capability to detect some faults.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akkar, M.L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES, Lecture Notes in Computer Science, vol. 2162, pp. 309–318. Springer, Berlin (2001)

  2. Blömer, J., Guajardo, J., Krummel, V.: Provably secure masking of aes. In: Handschuh, H., Hasan, M.A. (eds.) Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 3357, pp. 69–83. Springer, Berlin (2004)

  3. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M.J. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 1666, pp. 398–412. Springer, Berlin (1999)

  4. Fumaroli, G., Martinelli, A., Prouff, E., Rivain, M.: Affine masking against higher-order side channel analysis. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 6544, pp. 262–280. Springer, Berlin (2010)

  5. Gierlichs, B., Batina, L., Preneel, B., Verbauwhede, I.: Revisiting higher-order dpa attacks:. In: Pieprzyk, J. (ed.) CT-RSA, Lecture Notes in Computer Science, vol. 5985, pp. 221–234. Springer, Berlin (2010)

  6. Goubin, L., Patarin, J.: DES and differential power analysis (the “duplication” method). In: Koç, Ç.K., Paar, C. (eds.) CHES, Lecture Notes in Computer Science, vol. 1717, pp. 158–172. Springer (1999)

  7. Grassl, M.: Code tables: bounds on the parameters of various types of codes. http://www.codetables.de/, visited in 2010

  8. Joye, M., Paillier, P., Schoenmakers, B.: On second-order differential power analysis. In: Rao, J.R., Sunar, B. (eds.) CHES, Lecture Notes in Computer Science, vol. 3659, pp. 293–308. Springer, Berlin (2005)

  9. Li, Y., Sakiyama, K., Kawamura, S., Komano, Y., Ohta, K.: Security evaluation of a dpa-resistant s-box based on the fourier transform. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS, Lecture Notes in Computer Science, vol. 5927, pp. 3–16. Springer, Berlin (2009)

  10. MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes. North-Holland, Amsterdam (1977)

  11. Medwed, M., Schmidt, J.M.: Coding schemes for arithmetic and logic operations—how robust are they? In: Youm, H.Y., Yung, M. (eds.) WISA, Lecture Notes in Computer Science, vol. 5932, pp. 51–65. Springer, Berlin (2009)

  12. Messerges, T.S.: Using second-order power analysis to attack dpa resistant software. In: Koç, Ç.K., Paar, C. (eds.) CHES, Lecture Notes in Computer Science, vol. 1965, pp. 238–251. Springer, Berlin (2000)

  13. National Institute of Standards and Technology: Advanced Encryption Standard (FIPS PUB 197) (2001). http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  14. Oswald, E., Mangard, S., Pramstaller, N.: Secure and efficient masking of aes—a mission impossible? Cryptology ePrint Archive, Report 2004/134 (2004). http://eprint.iacr.org/

  15. Ozarow L.H., Wyner A.D.: Wire-tap channel II. Bell Syst. Tech. J. 63(10), 2135–2157 (1984)

    MATH  Google Scholar 

  16. Ozarow, L.H., Wyner, A.D.: Wire-tap channel ii. In: EUROCRYPT, pp. 33–50 (1984)

  17. Prouff, E., Giraud, C., Aumônier, S.: Provably secure s-box implementation based on fourier transform. In: Goubin, L., Matsui, M. (eds.) CHES, Lecture Notes in Computer Science, vol. 4249, pp. 216–230. Springer, Berlin (2006)

  18. Prouff, E., Rivain, M.: Theoretical and practical aspects of mutual information based side channel analysis. In: Abdalla, M., Pointcheval, D., Fouque, P.A., Vergnaud, D. (eds.) ACNS, Lecture Notes in Computer Science, vol. 5536, pp. 499–518. Springer, Berlin (2009)

  19. Prouff E., Rivain M., Bevan R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799–811 (2009)

    Article  MathSciNet  Google Scholar 

  20. Schramm, K., Paar, C.: Higher order masking of the AES. In: Pointcheval, D. (ed.) CT-RSA, Lecture Notes in Computer Science, vol. 3860, pp. 208–225. Springer, Berlin (2006)

  21. Standaert, F.X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT, Lecture Notes in Computer Science, vol. 5479, pp. 443–461. Springer, Berlin (2009)

  22. Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W., Merolla, J.M.: Capacity achieving codes for the wire tap channel with applications to quantum key distribution. CoRR cs.IT/0411003 (2004)

  23. Tillich, S., Herbst, C.: Attacking state-of-the-art software countermeasures-a case study for aes. In: Oswald E., Rohatgi P. (eds.) CHES, Lecture Notes in Computer Science, vol. 5154, pp. 228–243. Springer, Berlin (2008)

  24. von Willich, M.: A technique with an information-theoretic basis for protecting secret data from differential power attacks. In: Honary B. (ed.) IMA International Conference on Lecture Notes in Computer Science, vol. 2260, pp. 44–62. Springer, Berlin (2001)

  25. Wyner A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355–1387 (1975)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hervé Chabanne.

Additional information

This work has been partially funded by the JST/ANR SPACES (Security evaluation of Physically Attacked Cryptoprocessors in Embedded Systems) project.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bringer, J., Chabanne, H. & Le, T.H. Protecting AES against side-channel analysis using wire-tap codes. J Cryptogr Eng 2, 129–141 (2012). https://doi.org/10.1007/s13389-012-0034-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13389-012-0034-2

Keywords

Navigation