Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES

被引:11
|
作者
Kim, HeeSeok [2 ]
Kim, Tae Hyun [3 ]
Han, Dong-Guk [1 ]
Hong, Seokhie [2 ]
机构
[1] Kookmin Univ, Dept Math, Seoul, South Korea
[2] CIST, Seoul, South Korea
[3] ETRI, Taejon, South Korea
关键词
Side-channel attacks; masking method; composite field; ARIA; AES; POWER ANALYSIS; MULTIPLICATIVE MASKING; IMPLEMENTATION; RESISTANT; FPGA;
D O I
10.4218/etrij.10.0109.0181
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose efficient masking methods for ARIA and AES. In general, a masked S-box (MS) block can be constructed in different ways depending on the implementation platform, such as hardware and software. However, the other components of ARIA and AES have less impact on the implementation cost. We first propose an efficient masking structure by minimizing the number of mask corrections under the assumption that we have an MS block. Second, to make a secure and efficient MS block for AREA and AES, we propose novel methods to solve the table size problem for the MS block in a software implementation and to reduce the cost of a masked inversion which is the main part of the MS block in the hardware implementation.
引用
收藏
页码:370 / 379
页数:10
相关论文
共 50 条
  • [31] Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES
    List, Eik
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2024, 2024, 14977 : 45 - 64
  • [32] General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES
    Florez-Gutierrez, Antonio
    Grassi, Lorenzo
    Leander, Gregor
    Sibleyras, Ferdinand
    Todo, Yosuke
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT IX, 2025, 15492 : 280 - 311
  • [33] Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks
    Christophe Clavier
    Quentin Isorez
    Damien Marion
    Antoine Wurcker
    Cryptography and Communications, 2015, 7 : 121 - 162
  • [34] Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks
    Clavier, Christophe
    Isorez, Quentin
    Marion, Damien
    Wurcker, Antoine
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (01): : 121 - 162
  • [35] SCARE and power attack on AES-like block ciphers with secret S-box
    LIU Xin
    WANG An
    ZHU Liehuang
    DING Yaoling
    LYU Zeyuan
    WANG Zongyue
    Frontiers of Computer Science, 2022, 16 (04)
  • [36] SCARE and power attack on AES-like block ciphers with secret S-box
    Liu, Xin
    Wang, An
    Zhu, Liehuang
    Ding, Yaoling
    Lyu, Zeyuan
    Wang, Zongyue
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (04)
  • [37] Design of fault-resilient S-boxes for AES-like block ciphers
    Swapan Maiti
    Dipanwita Roy Chowdhury
    Cryptography and Communications, 2021, 13 : 71 - 100
  • [38] Design of fault-resilient S-boxes for AES-like block ciphers
    Maiti, Swapan
    Chowdhury, Dipanwita Roy
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (01): : 71 - 100
  • [39] SCARE and power attack on AES-like block ciphers with secret S-box
    Xin Liu
    An Wang
    Liehuang Zhu
    Yaoling Ding
    Zeyuan Lyu
    Zongyue Wang
    Frontiers of Computer Science, 2022, 16
  • [40] An efficient permutation approach for SbPN-based symmetric block ciphers
    Nazish, Mir
    Banday, M. Tariq
    Syed, Insha
    Banday, Sheena
    CYBERSECURITY, 2023, 6 (01)