Advertisement

An Implementation of DES and AES, Secure against Some Attacks

  • Mehdi-Laurent Akkar
  • Christophe Giraud
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2162)

Abstract

Since Power Analysis on smart cards was introduced by Paul Kocher [7], many countermeasures have been proposed to protect implementations of cryptographic algorithms. In this paper we propose a new protection principle: the transformed masking method. We apply this method to protect two of the most popular block ciphers: DES and the AES Rijndael. To this end we introduce some transformed S-boxes for DES and a new masking method and its applications to the non-linear part of Rijndael.

Keywords

AES Rijndael DES Transformed mask Multiplicative mask Power analysis DPA SPA Smart Cards 

References

  1. 1.
    M.-L. Akkar, R. Bévan, P. Dischamp, and D. Moyart. Power analysis, what is now possible. Asiacrypt, 2000.Google Scholar
  2. 2.
    S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi. A cautionary note regarding evaluation of aes candidates on smart-cards. The Second AES Candidate Conference, 1999.Google Scholar
  3. 3.
    S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. Crypto, 1999.Google Scholar
  4. 4.
    J.-S. Coron and L. Goubin. On boolean and arithmetic masking against differential power analysis. CHES, 2000.Google Scholar
  5. 5.
    Joan Daemen and Vincent Rijmen. The block cipher rijndael. Web Page: http://www.esat.kuleuven.ac.be/~rijmen/rijndael/, 2000.
  6. 6.
    L. Goubin and J. Patarin. Des and differential power analysis, the duplication method. CHES, 1999.Google Scholar
  7. 7.
    P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Web Site: http://www.cryptography.com/dpa, 1998.
  8. 8.
    P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Crypto, 1999.Google Scholar
  9. 9.
    T.S. Messerges. Using second-order power analysis to attack dpa resistant software. CHES, 2000.Google Scholar
  10. 10.
    National Bureau of Standards. The data encryption standard. FIPS PUB 46, 1977.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Mehdi-Laurent Akkar
    • 1
  • Christophe Giraud
    • 2
  1. 1.Schlumberger CP8LouveciennesFrance
  2. 2.Oberthur Card SystemsPuteauxFrance

Personalised recommendations