An Implementation of DES and AES, Secure against Some Attacks
Since Power Analysis on smart cards was introduced by Paul Kocher , many countermeasures have been proposed to protect implementations of cryptographic algorithms. In this paper we propose a new protection principle: the transformed masking method. We apply this method to protect two of the most popular block ciphers: DES and the AES Rijndael. To this end we introduce some transformed S-boxes for DES and a new masking method and its applications to the non-linear part of Rijndael.
KeywordsAES Rijndael DES Transformed mask Multiplicative mask Power analysis DPA SPA Smart Cards
- 1.M.-L. Akkar, R. Bévan, P. Dischamp, and D. Moyart. Power analysis, what is now possible. Asiacrypt, 2000.Google Scholar
- 2.S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi. A cautionary note regarding evaluation of aes candidates on smart-cards. The Second AES Candidate Conference, 1999.Google Scholar
- 3.S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. Crypto, 1999.Google Scholar
- 4.J.-S. Coron and L. Goubin. On boolean and arithmetic masking against differential power analysis. CHES, 2000.Google Scholar
- 5.Joan Daemen and Vincent Rijmen. The block cipher rijndael. Web Page: http://www.esat.kuleuven.ac.be/~rijmen/rijndael/, 2000.
- 6.L. Goubin and J. Patarin. Des and differential power analysis, the duplication method. CHES, 1999.Google Scholar
- 7.P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Web Site: http://www.cryptography.com/dpa, 1998.
- 8.P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Crypto, 1999.Google Scholar
- 9.T.S. Messerges. Using second-order power analysis to attack dpa resistant software. CHES, 2000.Google Scholar
- 10.National Bureau of Standards. The data encryption standard. FIPS PUB 46, 1977.Google Scholar