Projects per year
Abstract
Passive physical attacks, like power analysis, pose a serious threat to the security of digital circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption Standard (AES) hardware design that is completely scalable in terms of protection order. Therefore, we revisit the private circuits scheme of Ishai et al. [13] which is known to be vulnerable to glitches. We demonstrate how to achieve resistance against multivariate higher-order attacks in the presence of glitches for the same randomness cost as the private circuits scheme. Although our AES design is scalable, it is smaller, faster, and less randomness demanding than other side-channel protected AES implementations. Our first-order secure AES design, for example, requires only 18 bits of randomness per S-box operation and 6 kGE of chip area. We demonstrate the flexibility of our AES implementation by synthesizing it up to the 15th protection order.
Original language | English |
---|---|
Title of host publication | Topics in Cryptology – CT-RSA 2017 |
Place of Publication | Cham |
Publisher | Springer |
Pages | 95-112 |
Number of pages | 18 |
ISBN (Print) | 978-3-319-52152-7 |
DOIs | |
Publication status | Published - 2017 |
Event | Topics in Cryptology - The Cryptographer's Track at the RSA Conference 2017: CT-RSA 2017 - San Francisco, United States Duration: 14 Feb 2017 → 17 Feb 2017 https://www.rambus.com/ct-rsa-2017/ |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 10159 |
Conference
Conference | Topics in Cryptology - The Cryptographer's Track at the RSA Conference 2017 |
---|---|
Abbreviated title | CT-RSA 2017 |
Country/Territory | United States |
City | San Francisco |
Period | 14/02/17 → 17/02/17 |
Internet address |
Keywords
- Domain-Oriented Masking
- private circuits
- threshold implementations
- ISW
- side-channel analysis
- DPA
- hardware security
- AES
Fingerprint
Dive into the research topics of 'An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order'. Together they form a unique fingerprint.Projects
- 3 Finished
-
-
HECTOR - Hardware enable crypto and randomness
Korak, T., Mangard, S. & Mendel, F.
1/03/15 → 31/07/18
Project: Research project
-
SCALAS - Secure Contactless Applications based on Leakage-resilient cryptographic Schemes
Peßl, P. & Mangard, S.
1/07/14 → 31/12/16
Project: Research project