2003
DOI: 10.1007/3-540-36400-5_15
|View full text |Cite
|
Sign up to set email alerts
|

Simplified Adaptive Multiplicative Masking for AES

Abstract: Software counter measures against side channel attacks considerably hinder performance of cryptographic algorithms in terms of memory or execution time or both. The challenge is to achieve secure implementation with as little extra cost as possible. In this paper we optimize a counter measure for the AES block cipher consisting in transforming a boolean mask to a multiplicative mask prior to a non-linear Byte Substitution operation (thus, avoiding S-box re-computations for every run or storing multiple S-box t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
61
0

Year Published

2005
2005
2006
2006

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 83 publications
(62 citation statements)
references
References 8 publications
1
61
0
Order By: Relevance
“…In case of the AES algorithm, several algorithmic countermeasures have been proposed [2], [6], and [13]. They are all based on masking, i.e., the addition of a random value (the mask) to the intermediate AES values.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In case of the AES algorithm, several algorithmic countermeasures have been proposed [2], [6], and [13]. They are all based on masking, i.e., the addition of a random value (the mask) to the intermediate AES values.…”
Section: Introductionmentioning
confidence: 99%
“…They are all based on masking, i.e., the addition of a random value (the mask) to the intermediate AES values. However two of them, [2] and [13], are both susceptible to a certain type of (first-order) differential side-channel attack, the zero-value attack. The latter one has turned out to be vulnerable even to standard differential side-channel attacks as well [1].…”
Section: Introductionmentioning
confidence: 99%
“…For example, there are several publications on how to mask DES [1,8] and AES [1,2,7,24]. However, there also exist two publications [3,9] that discuss masking in a more generic way.…”
Section: The Theory Behind Masked Gatesmentioning
confidence: 99%
“…Applying masking at the algorithm level means that an algorithm is rewritten such that all intermediate results are randomized, while the input and the output of the algorithm are identical to those of the unmasked version. There are several publications that discuss how symmetric [1,7,8,24] and asymmetric ciphers [5,15] can be rewritten this way.…”
Section: Introductionmentioning
confidence: 99%
“…Then, the computation can be securely carried out by performing calculations with these random blocks. The second method, called the re-computation method [1,2,29], involves a recomputation of the lookup tables corresponding to the S-Box with one or several random value(s) which must be changed each time the algorithm is executed. The third generic method, that we call here S-Box secure calculation, has been essentially applied to protect AES implementations [5,15,28,32] due to the strong algebraic structure of the AES S-Box.…”
Section: Introductionmentioning
confidence: 99%