A fast and provably secure higher-order masking of AES S-box

Hee Seok Kim, Seokhie Hong, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Citations (Scopus)

Abstract

This paper proposes an efficient and secure higher-order masking algorithm for AES S-box that consumes the most computation time of the higher-order masked AES. During the past few years, much of the research has focused on finding higher-order masking schemes for this AES S-box, but these are still slow for embedded processors use. Our proposed higher-order masking of AES S-box is constructed based on the inversion operation over the composite field. We replace the subfield operations over the composite field into the table lookup operation, but these precomputation tables do not require much ROM space because these are the operations over GF(24). In the implementation results, we show that the higher-order masking scheme using our masked S-box is about 2.54 (second-order masking) and 3.03 (third-order masking) times faster than the fastest method among the existing higher-order masking schemes of AES.

Original languageEnglish
Title of host publicationCryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings
Pages95-107
Number of pages13
DOIs
Publication statusPublished - 2011
Event13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011 - Nara, Japan
Duration: 2011 Sep 282011 Oct 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6917 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011
CountryJapan
CityNara
Period11/9/2811/10/1

Keywords

  • AES
  • differential power analysis
  • higher-order DPA
  • higher-order masking
  • side channel attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A fast and provably secure higher-order masking of AES S-box'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., Hong, S., & Lim, J. (2011). A fast and provably secure higher-order masking of AES S-box. In Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings (pp. 95-107). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6917 LNCS). https://doi.org/10.1007/978-3-642-23951-9_7