Abstract
In order to against the side channel analysis attack such as power, electromagnetic waves, and time attack, an optimized masking method is proposed for Advanced Encryption Standard (AES) algorithm in this paper. This scheme adopts random hamming distance mask and offset randomization strategy in the first two rounds, the last round and two rounds randomly selected in the middle of the AES algorithm to ensure the security of each intermediate value. The scheme then adopts fixed-value mask strategy in the five rounds in the middle, which can reduce the time and space consumption to recalculate S box, improve the efficiency of the algorithm and reduce the production cost. To compare with other defence methods, we build a power analysis platform and conduct extensive experiments. The experimental results show that our optimized AES masking method is more secure than the compared methods, and it is able to resist second-order correlation power analysis (CPA) attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks (1998). www.cryptography.com/resources/whitepapers/DPATechInfo.pdf
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology-CRYPTO 1999, pp. 388–397. Springer, Heidelberg (1999)
Itoh, K., Takenaka, M., Torii, N.: DPA countermeasure based on the “masking method”. In: Information Security and Cryptology-ICISC 2001, pp. 440–456. Springer, Heidelberg (2002)
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Graz University of Technology, pp. 1–306, Springer, Austria (2007)
Nassar, M., Souissi, Y., Guilley, S., Danger, J.L.: RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. In: Design, Automation and Test in Europe Conference and Exhibition-DATE 2012, pp. 1173–1178. IEEE, Dresden (2012)
Ding, A.A., Zhang, L., Fei, Y., Luo, P.: A statistical model for higher order dpa on masked devices. In: Proceedings of CHES 2014, pp. 147–169. Springer, Berlin (2014)
Coron, J.S., Prouff, E., Rivain, M., Roche, T.: Higher-order side channel security and mask refreshing. In: International Workshop on Fast Software Encryption, pp. 410–424. Springer, Heidelberg (2013)
Zhang, R., Qiu, S., Zhou, Y.: Further improving efficiency of higher order masking schemes by decreasing randomness complexity. IEEE Trans. Inf. Forensics Secur. 12(11), 2590–2598 (2017)
Jiao, G., Li, L., Zou, Y.: Research on power attack comprehensive experiment platform based on SAKURA-G hardware circuit. In: Proceedings of the 2017 The 7th International Conference on Computer Engineering and Networks, Shanghai, pp. 343–349 (2017)
Xu, P.: Research and Implementation with Mask Technology on AES Encryption Module of Smartcard against Side Channel Attack. Chongqing University (2015). (in Chinese)
Acknowledgement
This study is supported by the Hunan Provincial Natural Science Foundation of China (2017JJ2010), the Scientific Research Fund of Hunan Provincial Education Department (16B039), the Science and Technology Plan Project of Hunan Province (2016TP1020), Open Fund Project of Hunan Provincial Key Laboratory of Intelligent Information Processing and Application for Hengyang Normal University (IIPA18K03).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Jiao, G., Li, L., Zou, Y. (2020). An Optimized AES Masking Method for Resisting Side Channel Analysis. In: Liu, Q., Mısır, M., Wang, X., Liu, W. (eds) The 8th International Conference on Computer Engineering and Networks (CENet2018). CENet2018 2018. Advances in Intelligent Systems and Computing, vol 905. Springer, Cham. https://doi.org/10.1007/978-3-030-14680-1_95
Download citation
DOI: https://doi.org/10.1007/978-3-030-14680-1_95
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14679-5
Online ISBN: 978-3-030-14680-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)