메뉴 건너뛰기




Volumn 4249 LNCS, Issue , 2006, Pages 76-90

Pinpointing the side-channel leakage of masked AES hardware implementations

Author keywords

AES; Delay chains; DPA; Glitches; Masking; Zero input DPA; Zero offset DPA

Indexed keywords

COMPUTER CRIME; CONSTRAINT THEORY; LOGIC GATES;

EID: 33750700765     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11894063_7     Document Type: Conference Paper
Times cited : (84)

References (23)
  • 1
    • 35048848006 scopus 로고    scopus 로고
    • Two power analysis attacks against one-mask methods
    • Bimal K. Roy and Willi Meier, editors, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, Springer
    • Mehdi-Laurent Akkar, Régis Bevan, and Louis Goubin. Two Power Analysis Attacks against One-Mask Methods. In Bimal K. Roy and Willi Meier, editors, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, volume 3017 of Lecture Notes in Computer Science, pages 332-347. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 332-347
    • Akkar, M.-L.1    Bevan, R.2    Goubin, L.3
  • 2
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and AES, secure against some attacks
    • Çetin Kaya Koç, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, Springer
    • Mehdi-Laurent Akkar and Christophe Giraud. An Implementation of DES and AES, Secure against Some Attacks. In Çetin Kaya Koç, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 3
    • 35048848490 scopus 로고    scopus 로고
    • Provably secure masking of AES
    • Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, Springer
    • Johannes Blömer, Jorge Guajardo, and Volker Krummel. Provably Secure Masking of AES. In Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, volume 3357 of Lecture Notes in Computer Science, pages 69-83. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3357 , pp. 69-83
    • Blömer, J.1    Guajardo, J.2    Krummel, V.3
  • 4
    • 27244432772 scopus 로고    scopus 로고
    • Masking at gate level in the presence of glitches
    • Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, Springer
    • Wieland Fischer and Berndt M. Gammel. Masking at Gate Level in the Presence of Glitches. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 187-200. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 187-200
    • Fischer, W.1    Gammel, B.M.2
  • 5
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative masking and power analysis of AES
    • Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Springer
    • Jovan D. Golić and Christophe Tymen. Multiplicative Masking and Power Analysis of AES. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 198-212. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2535 , pp. 198-212
    • Golić, J.D.1    Tymen, C.2
  • 6
    • 27244453895 scopus 로고    scopus 로고
    • On second-order differential power analysis
    • Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, Springer
    • Marc Joye, Pascal Paillier, and Berry Schoenmakers. On Second-Order Differential Power Analysis. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 293-308. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 293-308
    • Joye, M.1    Paillier, P.2    Schoenmakers, B.3
  • 7
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, Springer
    • Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 8
    • 24144459808 scopus 로고    scopus 로고
    • Side-channel leakage of masked CMOS gates
    • Alfred Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, Springer
    • Stefan Mangard, Thomas Popp, and Berndt M. Gammel. Side-Channel Leakage of Masked CMOS Gates. In Alfred Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, pages 351-365. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 351-365
    • Mangard, S.1    Popp, T.2    Gammel, B.M.3
  • 9
    • 27244451021 scopus 로고    scopus 로고
    • Successfully attacking masked AES hardware implementations
    • Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, Springer
    • Stefan Mangard, Norbert Pramstaller, and Elisabeth Oswald. Successfully Attacking Masked AES Hardware Implementations. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 157-171. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 157-171
    • Mangard, S.1    Pramstaller, N.2    Oswald, E.3
  • 10
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Çetin Kaya Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, Springer
    • Thomas S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Çetin Kaya Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, volume 1965 of Lecture Notes in Computer Science, pages 238-251. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 12
    • 35248894915 scopus 로고    scopus 로고
    • An optimized S-box circuit architecture for low power AES design
    • Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Springer
    • Sumio Morioka and Akashi Satoh. An Optimized S-Box Circuit Architecture for Low Power AES Design. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 172-186. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2535 , pp. 172-186
    • Morioka, S.1    Satoh, A.2
  • 13
    • 3042644992 scopus 로고    scopus 로고
    • November
    • National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. Available online at http://www.itl.nist. gov/fipspubs/.
    • (2001) FIPS-197: Advanced Encryption Standard
  • 14
    • 33745679179 scopus 로고    scopus 로고
    • Practical second-order DPA attacks for masked smart card implementations of block ciphers
    • David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, Springer
    • Elisabeth Oswald, Stefan Mangard, Christoph Herbst, and Stefan Tillich. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, volume 3860 of Lecture Notes in Computer Science, pages 192-207. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 192-207
    • Oswald, E.1    Mangard, S.2    Herbst, C.3    Tillich, S.4
  • 15
    • 26444465110 scopus 로고    scopus 로고
    • A side-channel analysis resistant description of the AES S-box
    • Henri Gilbert and Helena Handschuh, editors, Fast Software Encryption, 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Proceedings, Springer
    • Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, and Vincent Rijmen. A Side-Channel Analysis Resistant Description of the AES S-box. In Henri Gilbert and Helena Handschuh, editors, Fast Software Encryption, 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Proceedings, volume 3557 of Lecture Notes in Computer Science, pages 413-423. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3557 , pp. 413-423
    • Oswald, E.1    Mangard, S.2    Pramstaller, N.3    Rijmen, V.4
  • 16
    • 27244451515 scopus 로고    scopus 로고
    • Masked dual-rail pre-charge logic: DPA-resistance without routing constraints
    • Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, Springer
    • Thomas Popp and Stefan Mangard. Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 172-186. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 172-186
    • Popp, T.1    Mangard, S.2
  • 17
    • 84946832086 scopus 로고    scopus 로고
    • A compact rijndael hardware architecture with S-box optimization
    • Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, Springer
    • Akashi Satoh, Sumio Morioka, Kohji Takano, and Seiji Munetoh. A Compact Rijndael Hardware Architecture with S-Box Optimization. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 239-254. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 239-254
    • Satoh, A.1    Morioka, S.2    Takano, K.3    Munetoh, S.4
  • 18
    • 33745652931 scopus 로고    scopus 로고
    • Higher order masking of the AES
    • David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, Springer
    • Kai Schramm and Christof Paar. Higher Order Masking of the AES. In David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, volume 3860 of Lecture Notes in Computer Science, pages 208-225. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 208-225
    • Schramm, K.1    Paar, C.2
  • 20
    • 27244445509 scopus 로고    scopus 로고
    • DPA leakage models for CMOS logic circuits
    • Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, Springer
    • Daisuke Suzuki, Minoru Saeki, and Tetsuya Ichikawa. DPA Leakage Models for CMOS Logic Circuits. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 366-382. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 366-382
    • Suzuki, D.1    Saeki, M.2    Ichikawa, T.3
  • 21
    • 24144458916 scopus 로고    scopus 로고
    • Small size, low power, side channel-immune AES coprocessor: Design and synthesis results
    • Hans Dobbertin, Vincent Rijmen, and Aleksandra Sowa, editors, Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, Springer
    • Elena Trichina, Tymur Korkishko, and Kyung-Hee Lee. Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results. In Hans Dobbertin, Vincent Rijmen, and Aleksandra Sowa, editors, Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, volume 3373 of Lecture Notes in Computer Science, pages 113-127. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3373 , pp. 113-127
    • Trichina, E.1    Korkishko, T.2    Lee, K.-H.3
  • 22
    • 35248890508 scopus 로고    scopus 로고
    • Simplified adaptive multiplicative masking for AES
    • Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Springer
    • Elena Trichina, Domenico De Seta, and Lucia Germani. Simplified Adaptive Multiplicative Masking for AES. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 187-197. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2535 , pp. 187-197
    • Trichina, E.1    De Seta, D.2    Germani, L.3
  • 23
    • 35048870686 scopus 로고    scopus 로고
    • Towards efficient second-order power analysis
    • Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, Springer
    • Jason Waddle and David Wagner. Towards Efficient Second-Order Power Analysis. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, volume 3156 of Lecture Notes in Computer Science, pages 1-15. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.