A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher
This paper presents the employment of a DPA attack on the NIST (National Institute of Standards and Technology) standardized AES (advance encryption standard) protocol for key retrieval and prevention. Towards key retrieval, we applied the DPA attack on AES to obtain a 128-bit secret key by measurin...
Guardado en:
Autores principales: | , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/2120fddc0524461b800301afca9a58d8 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:2120fddc0524461b800301afca9a58d8 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:2120fddc0524461b800301afca9a58d82021-11-11T15:20:21ZA Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher10.3390/app1121103142076-3417https://doaj.org/article/2120fddc0524461b800301afca9a58d82021-11-01T00:00:00Zhttps://www.mdpi.com/2076-3417/11/21/10314https://doaj.org/toc/2076-3417This paper presents the employment of a DPA attack on the NIST (National Institute of Standards and Technology) standardized AES (advance encryption standard) protocol for key retrieval and prevention. Towards key retrieval, we applied the DPA attack on AES to obtain a 128-bit secret key by measuring the power traces of the computations involved in the algorithm. In resistance to the DPA attack, we proposed a countermeasure, or a new modified masking scheme, comprising (i) Boolean and (ii) multiplicative masking, for linear and non-linear operations of AES, respectively. Furthermore, we improved the complexity involved in Boolean masking by introducing Rebecca’s approximation. Moreover, we provide a novel solution to tackle the zero mask problem in multiplicative masking. To evaluate the power traces, we propose our custom correlation technique, which results in a decrease in the calculation time. The synthesis results for original implementation (without countermeasure) and inclusion of countermeasure are given on a Zynq 7020 FPGA (Artix-7 device). It takes 424 FPGA slices when implemented without considering the countermeasure, whereas 714 slices are required to implement AES with the inclusion of the proposed countermeasure. Consequently, the implementation results provide the acceptability of this work for area-constrained applications that require prevention against DPA attacks.Muhammad Asfand HafeezMohammad Mazyad Hazzazi Hassan TariqAmer AljaediAsfa JavedAdel R. AlharbiMDPI AGarticleAESblock cipherside-channel attacksdifferential power analysisTechnologyTEngineering (General). Civil engineering (General)TA1-2040Biology (General)QH301-705.5PhysicsQC1-999ChemistryQD1-999ENApplied Sciences, Vol 11, Iss 10314, p 10314 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
AES block cipher side-channel attacks differential power analysis Technology T Engineering (General). Civil engineering (General) TA1-2040 Biology (General) QH301-705.5 Physics QC1-999 Chemistry QD1-999 |
spellingShingle |
AES block cipher side-channel attacks differential power analysis Technology T Engineering (General). Civil engineering (General) TA1-2040 Biology (General) QH301-705.5 Physics QC1-999 Chemistry QD1-999 Muhammad Asfand Hafeez Mohammad Mazyad Hazzazi Hassan Tariq Amer Aljaedi Asfa Javed Adel R. Alharbi A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher |
description |
This paper presents the employment of a DPA attack on the NIST (National Institute of Standards and Technology) standardized AES (advance encryption standard) protocol for key retrieval and prevention. Towards key retrieval, we applied the DPA attack on AES to obtain a 128-bit secret key by measuring the power traces of the computations involved in the algorithm. In resistance to the DPA attack, we proposed a countermeasure, or a new modified masking scheme, comprising (i) Boolean and (ii) multiplicative masking, for linear and non-linear operations of AES, respectively. Furthermore, we improved the complexity involved in Boolean masking by introducing Rebecca’s approximation. Moreover, we provide a novel solution to tackle the zero mask problem in multiplicative masking. To evaluate the power traces, we propose our custom correlation technique, which results in a decrease in the calculation time. The synthesis results for original implementation (without countermeasure) and inclusion of countermeasure are given on a Zynq 7020 FPGA (Artix-7 device). It takes 424 FPGA slices when implemented without considering the countermeasure, whereas 714 slices are required to implement AES with the inclusion of the proposed countermeasure. Consequently, the implementation results provide the acceptability of this work for area-constrained applications that require prevention against DPA attacks. |
format |
article |
author |
Muhammad Asfand Hafeez Mohammad Mazyad Hazzazi Hassan Tariq Amer Aljaedi Asfa Javed Adel R. Alharbi |
author_facet |
Muhammad Asfand Hafeez Mohammad Mazyad Hazzazi Hassan Tariq Amer Aljaedi Asfa Javed Adel R. Alharbi |
author_sort |
Muhammad Asfand Hafeez |
title |
A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher |
title_short |
A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher |
title_full |
A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher |
title_fullStr |
A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher |
title_full_unstemmed |
A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher |
title_sort |
low-overhead countermeasure against differential power analysis for aes block cipher |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/2120fddc0524461b800301afca9a58d8 |
work_keys_str_mv |
AT muhammadasfandhafeez alowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT mohammadmazyadhazzazi alowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT hassantariq alowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT ameraljaedi alowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT asfajaved alowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT adelralharbi alowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT muhammadasfandhafeez lowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT mohammadmazyadhazzazi lowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT hassantariq lowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT ameraljaedi lowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT asfajaved lowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher AT adelralharbi lowoverheadcountermeasureagainstdifferentialpoweranalysisforaesblockcipher |
_version_ |
1718435354773553152 |