An Optimized AES Masking Method for Resisting Side Channel Analysis
In order to against the side channel analysis attack such as power, electromagnetic waves, and time attack, an optimized masking method is proposed for Advanced Encryption Standard (AES) algorithm in this paper. This scheme adopts random hamming distance mask and offset randomization strategy in the first two rounds, the last round and two rounds randomly selected in the middle of the AES algorithm to ensure the security of each intermediate value. The scheme then adopts fixed-value mask strategy in the five rounds in the middle, which can reduce the time and space consumption to recalculate S box, improve the efficiency of the algorithm and reduce the production cost. To compare with other defence methods, we build a power analysis platform and conduct extensive experiments. The experimental results show that our optimized AES masking method is more secure than the compared methods, and it is able to resist second-order correlation power analysis (CPA) attacks.
KeywordsMasking AES Resisting side channel analysis
This study is supported by the Hunan Provincial Natural Science Foundation of China (2017JJ2010), the Scientific Research Fund of Hunan Provincial Education Department (16B039), the Science and Technology Plan Project of Hunan Province (2016TP1020), Open Fund Project of Hunan Provincial Key Laboratory of Intelligent Information Processing and Application for Hengyang Normal University (IIPA18K03).
- 1.Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks (1998). www.cryptography.com/resources/whitepapers/DPATechInfo.pdf
- 4.Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Graz University of Technology, pp. 1–306, Springer, Austria (2007)Google Scholar
- 5.Nassar, M., Souissi, Y., Guilley, S., Danger, J.L.: RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. In: Design, Automation and Test in Europe Conference and Exhibition-DATE 2012, pp. 1173–1178. IEEE, Dresden (2012)Google Scholar
- 6.Ding, A.A., Zhang, L., Fei, Y., Luo, P.: A statistical model for higher order dpa on masked devices. In: Proceedings of CHES 2014, pp. 147–169. Springer, Berlin (2014)Google Scholar
- 7.Coron, J.S., Prouff, E., Rivain, M., Roche, T.: Higher-order side channel security and mask refreshing. In: International Workshop on Fast Software Encryption, pp. 410–424. Springer, Heidelberg (2013)Google Scholar
- 9.Jiao, G., Li, L., Zou, Y.: Research on power attack comprehensive experiment platform based on SAKURA-G hardware circuit. In: Proceedings of the 2017 The 7th International Conference on Computer Engineering and Networks, Shanghai, pp. 343–349 (2017)Google Scholar
- 10.Xu, P.: Research and Implementation with Mask Technology on AES Encryption Module of Smartcard against Side Channel Attack. Chongqing University (2015). (in Chinese)Google Scholar