{"title":"利用塔场的有效AES掩蔽方法","authors":"Khac-Hoan Pham, Thai-Ha Tran, T. Nguyen, C. Pham","doi":"10.1109/ICCE55644.2022.9852062","DOIUrl":null,"url":null,"abstract":"A combination of the Boolean masking with the multiplicative masking for AES S-box is secured against side-channel attacks, particularly power analysis attacks. However, it is paid for by significantly increasing the complexity of the S-box implementation in hardware. This paper proposes a masking method based on the inversion in the tower field to cope with that problem. The experimental results show that the proposed method assures security against CPA up to 30,000 traces with the AES-TFM-2 scheme and more than 12,660 traces with the AES-TFM-1 one. There is a trade-off between the security level and the hardware implementation cost of the two proposed schemes. However, the technique reduces that cost considerably compared to existing approaches, and it is also secured against zero-value attacks.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Efficient Masking Method for AES Using Tower Fields\",\"authors\":\"Khac-Hoan Pham, Thai-Ha Tran, T. Nguyen, C. Pham\",\"doi\":\"10.1109/ICCE55644.2022.9852062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A combination of the Boolean masking with the multiplicative masking for AES S-box is secured against side-channel attacks, particularly power analysis attacks. However, it is paid for by significantly increasing the complexity of the S-box implementation in hardware. This paper proposes a masking method based on the inversion in the tower field to cope with that problem. The experimental results show that the proposed method assures security against CPA up to 30,000 traces with the AES-TFM-2 scheme and more than 12,660 traces with the AES-TFM-1 one. There is a trade-off between the security level and the hardware implementation cost of the two proposed schemes. However, the technique reduces that cost considerably compared to existing approaches, and it is also secured against zero-value attacks.\",\"PeriodicalId\":388547,\"journal\":{\"name\":\"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE55644.2022.9852062\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE55644.2022.9852062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Efficient Masking Method for AES Using Tower Fields
A combination of the Boolean masking with the multiplicative masking for AES S-box is secured against side-channel attacks, particularly power analysis attacks. However, it is paid for by significantly increasing the complexity of the S-box implementation in hardware. This paper proposes a masking method based on the inversion in the tower field to cope with that problem. The experimental results show that the proposed method assures security against CPA up to 30,000 traces with the AES-TFM-2 scheme and more than 12,660 traces with the AES-TFM-1 one. There is a trade-off between the security level and the hardware implementation cost of the two proposed schemes. However, the technique reduces that cost considerably compared to existing approaches, and it is also secured against zero-value attacks.