TY - GEN
T1 - Advanced encryption standard (AES) implementation with increased DPA resistance and low overhead
AU - Goodwin, John
AU - Wilson, Peter R.
PY - 2008
Y1 - 2008
N2 - The use of the Advanced Encryption Standard (AES) has become pervasive in a large number of communication applications. The hardware to implement AES is non trivial and as a result it has a significant overhead in its raw form. Despite the algorithm being inherently secure, side channel attacks have exposed potential weaknesses via the implementation route, particularly power analysis. As a result, much effort has been expended in identifying techniques to mask the power signature that can give away the secret key. Unfortunately, the hardware overhead is usually a significant proportion of the size of the original algorithm and in addition, the key can sometimes still be ascertained due to manufacturing differences (such as track lengths) still delivering aspects of the key in a power signature. This paper describes an approach that requires a simple modification to the implementation of the AES algorithm, without altering its basic characteristics, which provides a significantly improved strength against side channel attacks with a minimal additional hardware overhead.
AB - The use of the Advanced Encryption Standard (AES) has become pervasive in a large number of communication applications. The hardware to implement AES is non trivial and as a result it has a significant overhead in its raw form. Despite the algorithm being inherently secure, side channel attacks have exposed potential weaknesses via the implementation route, particularly power analysis. As a result, much effort has been expended in identifying techniques to mask the power signature that can give away the secret key. Unfortunately, the hardware overhead is usually a significant proportion of the size of the original algorithm and in addition, the key can sometimes still be ascertained due to manufacturing differences (such as track lengths) still delivering aspects of the key in a power signature. This paper describes an approach that requires a simple modification to the implementation of the AES algorithm, without altering its basic characteristics, which provides a significantly improved strength against side channel attacks with a minimal additional hardware overhead.
KW - AES
KW - Countermeasure
KW - DPA
UR - http://www.scopus.com/inward/record.url?scp=51749100391&partnerID=8YFLogxK
U2 - 10.1109/ISCAS.2008.4542160
DO - 10.1109/ISCAS.2008.4542160
M3 - Chapter in a published conference proceeding
AN - SCOPUS:51749100391
SN - 9781424416844
T3 - Proceedings - IEEE International Symposium on Circuits and Systems
SP - 3286
EP - 3289
BT - 2008 IEEE International Symposium on Circuits and Systems, ISCAS 2008
T2 - 2008 IEEE International Symposium on Circuits and Systems, ISCAS 2008
Y2 - 18 May 2008 through 21 May 2008
ER -