An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Hannes Groß*, Stefan Mangard, Thomas Korak

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Passive physical attacks, like power analysis, pose a serious threat to the security of digital circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption Standard (AES) hardware design that is completely scalable in terms of protection order. Therefore, we revisit the private circuits scheme of Ishai et al. [13] which is known to be vulnerable to glitches. We demonstrate how to achieve resistance against multivariate higher-order attacks in the presence of glitches for the same randomness cost as the private circuits scheme. Although our AES design is scalable, it is smaller, faster, and less randomness demanding than other side-channel protected AES implementations. Our first-order secure AES design, for example, requires only 18 bits of randomness per S-box operation and 6 kGE of chip area. We demonstrate the flexibility of our AES implementation by synthesizing it up to the 15th protection order.
Original languageEnglish
Title of host publicationTopics in Cryptology – CT-RSA 2017
Place of PublicationCham
PublisherSpringer
Pages95-112
Number of pages18
ISBN (Print)978-3-319-52152-7
DOIs
Publication statusPublished - 2017
EventTopics in Cryptology - The Cryptographer's Track at the RSA Conference 2017: CT-RSA 2017 - San Francisco, United States
Duration: 14 Feb 201717 Feb 2017
https://www.rambus.com/ct-rsa-2017/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10159

Conference

ConferenceTopics in Cryptology - The Cryptographer's Track at the RSA Conference 2017
Abbreviated titleCT-RSA 2017
Country/TerritoryUnited States
CitySan Francisco
Period14/02/1717/02/17
Internet address

Keywords

  • Domain-Oriented Masking
  • private circuits
  • threshold implementations
  • ISW
  • side-channel analysis
  • DPA
  • hardware security
  • AES

Fingerprint

Dive into the research topics of 'An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order'. Together they form a unique fingerprint.

Cite this