Random Addition-chain Based Countermeasure Against Side-channel Attack for Advanced Encryption Standard

被引:6
|
作者
Huang Hai [1 ]
Feng Xinxin [2 ]
Liu Hongyu [2 ]
Hou Jiao [3 ]
Zhao Yuying [3 ]
Yin Lili [1 ]
Jiang Jinxing [3 ]
机构
[1] Harbin Univ Sci & Technol, Sch Software & Microelect, Harbin 150080, Heilongjiang, Peoples R China
[2] Harbin Univ Sci & Technol, Sch Comp Sci & Technol, Harbin 150080, Heilongjiang, Peoples R China
[3] Harbin Univ Sci & Technol, Sch Sci, Harbin 150080, Heilongjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Advanced Encryption Standard (AES); Side channel attack; Byte substitution; Addition chains;
D O I
10.11999/JEIT171211
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Side channel attacks have serious threat to the hardware security of Advanced Encryption Standard (AES), how to resist the side channel attack becomes an urgent problem. Byte substitution operation is the only nonlinear operation in AES algorithm, so it is very important for the whole encryption algorithm to improve its security. In this paper, a countermeasure against side-channel attack is proposed based on random addition-chain for AES by replacing the fixed addition-chain with random addition-chain to realize the inverse operation of multiplication in a finite field GF(2(8)). The impact of the random addition-chain on the security and effectiveness of the algorithm is studied. Experimental results show that the proposed random additionchain based algorithm is more secure and effective than the previous fixed addition-chain based algorithms in defending against side channel attacks.
引用
收藏
页码:348 / 354
页数:7
相关论文
共 20 条
  • [1] AES side-channel countermeasure using random tower field constructions
    Bonnecaze, Alexis
    Liardet, Pierre
    Venelli, Alexandre
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2013, 69 (03) : 331 - 349
  • [2] Carlet C, 2012, LECT NOTES COMPUT SC, V7549, P366, DOI 10.1007/978-3-642-34047-5_21
  • [3] Higher-Order Side Channel Security and Mask Refreshing
    Coron, Jean-Sebastien
    Prouff, Emmanuel
    Rivain, Matthieu
    Roche, Thomas
    [J]. FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 410 - 424
  • [4] Coron JS, 2014, LECT NOTES COMPUT SC, V8441, P441, DOI 10.1007/978-3-642-55220-5_25
  • [5] Duan Xiaoyi, 2017, Computer Engineering, V43, P120, DOI 10.3969/j.issn.1000-3428.2017.10.021
  • [6] Private circuits: Securing hardware against probing attacks
    Ishai, Y
    Sahai, A
    Wagner, D
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 463 - 481
  • [7] Jungk B, 2012, 2012 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT'12), P125, DOI 10.1109/FPT.2012.6412123
  • [8] [刘国强 Liu Guoqiang], 2014, [电子与信息学报, Journal of Electronics & Information Technology], V36, P74
  • [9] LIU Yanping, 2016, MODERN ELECT TECHNIQ, V39, P5, DOI [10.16652/j.issn.1004-373x.2016.10.002, DOI 10.16652/J.ISSN.1004-373X.2016.10.002]
  • [10] Oswald E, 2005, LECT NOTES COMPUT SC, V3557, P413