当前位置: X-MOL 学术ETRI J. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding
ETRI Journal ( IF 1.3 ) Pub Date : 2021-06-02 , DOI: 10.4218/etrij.2020-0175
Shanthi Rekha Shanmugham 1 , Saravanan Paramasivam 1
Affiliation  

Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.

中文翻译:

基于1-of-4数据编码的功率分析攻击弹性分组密码实现

侧信道攻击对密码算法的实现提出了不可避免的挑战,缓解它们很重要。这项工作确定了一种基于 1-of-4 代码的新型数据编码技术,以抵抗差分功率分析攻击,这是研究最多的侧信道攻击类别。1-of-4码的四个码字,即(0001、0010、1000和0100),被分成两组:set-0和set-1。使用选择信号,硬件处理的数据在两个编码集之间交替切换,从而使汉明权重和汉明距离相等。作为案例研究,所提出的技术已针对 NIST 标准 AES-128 密码进行了验证。所提出的技术抵抗使用统计方法执行的差分功率分析,即相关性、互信息、均值差异,以及基于汉明权重和距离模型的 Welch t 检验。实验结果表明,所提出的对策具有 2.3 倍的面积开销,而性能相对没有下降。
更新日期:2021-06-02
down
wechat
bug