Advertisement

Investigations of Power Analysis Attacks and Countermeasures for ARIA

  • HyungSo Yoo
  • Christoph Herbst
  • Stefan Mangard
  • Elisabeth Oswald
  • SangJae Moon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4298)

Abstract

In this paper we investigate implementations of ARIA on an 8-bit smartcard. Our investigation focuses on the resistance against different types of differential power analysis (DPA) attacks. We show that an unprotected implementation of ARIA allows to deduce the secret key with a low number of measurements. In order to thwart these simple DPA attacks, we mask and randomize the ARIA implementation on the smartcard. It turns out that due to the structure of ARIA, a masked implementation requires significantly more resources than an unprotected implementation. However, the masked and randomized implementation provides a high resistance against power analysis attacks.

Keywords

ARIA DPA smartcard 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [AG01]
    Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. [AG03]
    Akkar, M.-L., Goubin, L.: A Generic Protection against High-Order Differential Power Analysis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 192–205. Springer, Heidelberg (2003)Google Scholar
  3. [BGK05]
    Blömer, J., Guajardo, J., Krummel, V.: Provably Secure Masking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 69–83. Springer, Heidelberg (2004)Google Scholar
  4. [HKM+05]
    Ha, J., Kim, C., Moon, S., Park, I., Yoo, H.: Differential Power Analysis on Block Cipher ARIA. In: Yang, L.T., Rana, O.F., Di Martino, B., Dongarra, J.J. (eds.) HPCC 2005. LNCS, vol. 3726, pp. 541–548. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. [HOM06]
    Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239–252. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. [KJJ99]
    Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
  7. [KKP+04]
    Kwon, D., Kim, J., Park, S., Sung, S.H., Sohn, Y., Song, J.H., Yeom, Y., Yoon, E-J., Lee, S., Lee, J., Chee, S., Han, D., Hong, J.: New Block Cipher: ARIA. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 432–445. Springer, Heidelberg (2004)Google Scholar
  8. [Mes00]
    Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 150–164. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. [OMHT06]
    Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 192–207. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. [OMPR05]
    Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A Side-Channel Analysis Resistant Description of the AES S-box. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 413–423. Springer, Heidelberg (2005)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • HyungSo Yoo
    • 1
  • Christoph Herbst
    • 2
  • Stefan Mangard
    • 2
  • Elisabeth Oswald
    • 2
  • SangJae Moon
    • 1
  1. 1.Dept. of Electrical Engineering, Kyungpook National UniversityKorea
  2. 2.Institute for Applied InformationProcessing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A–8010 GrazAustria

Personalised recommendations