Balanced Encoding of Near-Zero Correlation for an AES Implementation

07/27/2022
by   Seungkwang Lee, et al.
0

Power consumption of a circuit can be exploited to recover the secret key of a cryptographic algorithm. This technique is known as power analysis, one of the well-known techniques of side-channel analysis. Many software countermeasures against power analysis present a time-space trade-off. Masking and shuffling come at cost of the execution time and the extreme use of run-time random number generators. Internally encoded implementations of block ciphers, on the other hand, require large memory space to store a set of lookup tables. While the internal encoding is widely used in white-box cryptography, it has a serious drawback. It cannot protect the secret key against power analysis. In this paper, we propose a secure internal encoding method of an AES implementation. Provided that the five inner rounds are left unprotected because these are not subject to power analysis, the lookup tables are approximately 232KB in size and the number of operation including XORs and table lookups are about 1,000 in total. This is about half the table size required by the white-box AES implementation, which is vulnerable to power analysis, and is about three times the amount of operations required by the straightforward AES implementation.

READ FULL TEXT

page 19

page 21

page 26

page 27

page 28

page 30

page 31

page 32

research
07/18/2023

On Borrowed Time – Preventing Static Power Side-Channel Analysis

In recent years, static power side-channel analysis attacks have emerged...
research
05/10/2022

PaCHash: Packed and Compressed Hash Tables

We introduce PaCHash, a hash table that stores its objects contiguously ...
research
07/30/2018

Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks

In Advanced Metering Infrastructure (AMI) systems, smart meters (SM) sen...
research
03/13/2022

Power-Based Side-Channel Attack for AES Key Extraction on the ATMega328 Microcontroller

We demonstrate the extraction of an AES secret key from flash memory on ...
research
09/21/2020

On Software Implementation of Gabidulin Decoders

This work compares the performance of software implementations of differ...
research
05/10/2022

Design and Implementation of a Secure RISC-V Microprocessor

Secret keys can be extracted from the power consumption or electromagnet...
research
04/19/2018

VeriTable: Fast Equivalence Verification of Multiple Large Forwarding Tables

Due to network practices such as traffic engineering and multi-homing, t...

Please sign up or login with your details

Forgot password? Click here to reset