Advertisement

An Optimized AES Masking Method for Resisting Side Channel Analysis

  • Ge JiaoEmail author
  • Lang Li
  • Yi Zou
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 905)

Abstract

In order to against the side channel analysis attack such as power, electromagnetic waves, and time attack, an optimized masking method is proposed for Advanced Encryption Standard (AES) algorithm in this paper. This scheme adopts random hamming distance mask and offset randomization strategy in the first two rounds, the last round and two rounds randomly selected in the middle of the AES algorithm to ensure the security of each intermediate value. The scheme then adopts fixed-value mask strategy in the five rounds in the middle, which can reduce the time and space consumption to recalculate S box, improve the efficiency of the algorithm and reduce the production cost. To compare with other defence methods, we build a power analysis platform and conduct extensive experiments. The experimental results show that our optimized AES masking method is more secure than the compared methods, and it is able to resist second-order correlation power analysis (CPA) attacks.

Keywords

Masking AES Resisting side channel analysis 

Notes

Acknowledgement

This study is supported by the Hunan Provincial Natural Science Foundation of China (2017JJ2010), the Scientific Research Fund of Hunan Provincial Education Department (16B039), the Science and Technology Plan Project of Hunan Province (2016TP1020), Open Fund Project of Hunan Provincial Key Laboratory of Intelligent Information Processing and Application for Hengyang Normal University (IIPA18K03).

References

  1. 1.
    Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks (1998). www.cryptography.com/resources/whitepapers/DPATechInfo.pdf
  2. 2.
    Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology-CRYPTO 1999, pp. 388–397. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  3. 3.
    Itoh, K., Takenaka, M., Torii, N.: DPA countermeasure based on the “masking method”. In: Information Security and Cryptology-ICISC 2001, pp. 440–456. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Graz University of Technology, pp. 1–306, Springer, Austria (2007)Google Scholar
  5. 5.
    Nassar, M., Souissi, Y., Guilley, S., Danger, J.L.: RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. In: Design, Automation and Test in Europe Conference and Exhibition-DATE 2012, pp. 1173–1178. IEEE, Dresden (2012)Google Scholar
  6. 6.
    Ding, A.A., Zhang, L., Fei, Y., Luo, P.: A statistical model for higher order dpa on masked devices. In: Proceedings of CHES 2014, pp. 147–169. Springer, Berlin (2014)Google Scholar
  7. 7.
    Coron, J.S., Prouff, E., Rivain, M., Roche, T.: Higher-order side channel security and mask refreshing. In: International Workshop on Fast Software Encryption, pp. 410–424. Springer, Heidelberg (2013)Google Scholar
  8. 8.
    Zhang, R., Qiu, S., Zhou, Y.: Further improving efficiency of higher order masking schemes by decreasing randomness complexity. IEEE Trans. Inf. Forensics Secur. 12(11), 2590–2598 (2017)CrossRefGoogle Scholar
  9. 9.
    Jiao, G., Li, L., Zou, Y.: Research on power attack comprehensive experiment platform based on SAKURA-G hardware circuit. In: Proceedings of the 2017 The 7th International Conference on Computer Engineering and Networks, Shanghai, pp. 343–349 (2017)Google Scholar
  10. 10.
    Xu, P.: Research and Implementation with Mask Technology on AES Encryption Module of Smartcard against Side Channel Attack. Chongqing University (2015). (in Chinese)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.College of Computer Science and TechnologyHengyang Normal UniversityHengyangChina
  2. 2.Hunan Provincial Key Laboratory of Intelligent Information Processing and ApplicationHengyangChina

Personalised recommendations