Abstract
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [12]. We apply the technique to BaseKing, a variant of 3-Way[9] that was published in [7]. We introduce an alternative method to protect against power analysis specific for BaseKing. Finally, we discuss the applicability of the methods to the other known bitslice ciphers 3-Way and Serpent [1].
Chapter PDF
References
E. Biham, R. Anderson, and L. Knudsen. Aes proposal serpent. AES CD-1: documentation, 1998.
E. Biham and A. Shamir. Differential cryptanalysis of des-like cryptosystems. Journal of Cryptology, 4(1):3–72, 1991.
E. Biham and A. Shamir. Power analysis of the key scheduling of the aes candidates. In 2nd AES Candidates Conference, March 1999.
S. Chari, C. Jutla, J. Rao, and P. Rohatgi. A cautionary note regarding evaluation of aes candidates on smart-cards. In Proceedings of the 2nd AES Candidates Conference, March 1999.
S. Chari, C. Jutla, J. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. In Advances in Cryptology-CRYPTO'99, pages 398–412. Springer-Verlag, 1999.
T. M. Cover and J. A. Thomas. Elements of Information Theory. John Wiley & Sons, 1991.
J. Daemen. Cipher and Hash Function Design. PhD thesis, Katholieke Universiteit Leuven, March 1995.
J. Daemen, R. Govaerts, and J. Vandewalle. Correlation matrices. In R. Anderson, editor, Fast Software Encryption, pages 275–285. Springer-Verlag, 1994.
J. Daemen, R. Govaerts, and J. Vandewalle. A new approach towards block cipher design. In R. Anderson, editor, Fast Software Encryption, pages 18–33. Springer-Verlag, 1994.
J. Daemen, R. Govaerts, and J. Vandewalle. Weak keys of idea. In Advances in Cryptology-CRYPTO’93, pages 224–231. Springer-Verlag, 1994.
D.W. Davies. Some regular properties of the des. In Advances in Cryptology-CRYPTO’82, pages 89–96. Plenum Press, 1983.
L. Goubin and J. Patarin. Des and differential power analysis. In CHES’99, volume 1717, pages 158–172. Springer-Verlag, 1999.
J. Kelsey, B. Schneier, and D. Wagner. Key-schedule cryptanalysis of idea, g-des, gost, safer and triple-des. In Advances in Cryptology-CRYPTO’ 96, page 237. Springer-Verlag, 1996.
P. Kocher, J. Jaffe, and B. Jun. Introduction to differential power analysis and related attacks. The article can be found at http://www.cryptography.com/dpa/technical/index.html, 1998.
M. Matsui. Linear cryptanalysis method for des cipher. In Advances in Cryptology-EUROCRYPT’93, page 386. Springer-Verlag, 1993.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Daemen, J., Peeters, M., Van Assche, G. (2001). Bitslice Ciphers and Power Analysis Attacks. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds) Fast Software Encryption. FSE 2000. Lecture Notes in Computer Science, vol 1978. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44706-7_10
Download citation
DOI: https://doi.org/10.1007/3-540-44706-7_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41728-6
Online ISBN: 978-3-540-44706-1
eBook Packages: Springer Book Archive