Secure and Efficient AES Software Implementation for Smart Cards
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory requirements had always presented a challenge. With the advent of side channel attacks, this task became even more difficult because a programmer must take into account countermeasures against such attacks, which often increases computational time, or memory requirements, or both.
In this paper we describe a new method for secure implementation of the Advanced Encryption Standard algorithm. The method is based on a data masking technique, which is the most widely used countermeasure against power analysis and timing attacks at a software level. The change of element representation allows us to achieve an efficient solution that combines low memory requirements with high speed and resistance to attacks.
KeywordsSmart Card Side Channel Attack Advance Encryption Standard Algorithm Cryptographic Hardware Secure Implementation
Unable to display preview. Download preview PDF.
- 2.Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999)Google Scholar
- 4.Daemen, J., Rijmen, V.: AES Proposal: Rijndael, AES submission (1998), Available at http://csrc.nist.gov/encryotion/aes/aes_home.htm
- 9.Huang, C., Xu, L.: Fast software implementation of finite field operations. Technical Report, Washington University in St. Louis (December 2003), Available at http://www.nisl.wustl.edu/Papers/Tech/GF.pdf
- 10.Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
- 11.Kocher, P.: Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)Google Scholar
- 12.Kocher, P., Jaffe, J., Jun, B.: Using unpredictable information to minimize leakage from smartcards and other cryptosystems, USA patent, International Publication number WO 99/63696, December 9 (1999)Google Scholar
- 13.Lu, C.C., Tseng, S.-Y.: Integrated design of AES (Advanced Encryption Srandard) encryptor and decryptor. In: Proceedings IEEE conf. on Application-Specific Systems, Architectures, and Processors (ASAP 2002). IEEE, Los Alamitos (2002)Google Scholar
- 16.Ouyang, J.Z.: Efficient method for multiplication over Galois fields, U.S. patent pub. number US2003/0128841 A1, July 10 (2003)Google Scholar
- 18.Rijmen, V.: Efficient implementation of Rijndael SBox, http://www.esat.kuleuven.ac.be/~rijmen/rijndael