Multiplicative Masking for AES in Hardware
نویسندگان
چکیده
منابع مشابه
Simplified Adaptive Multiplicative Masking for AES
Software counter measures against side channel attacks considerably hinder performance of cryptographic algorithms in terms of memory or execution time or both. The challenge is to achieve secure implementation with as little extra cost as possible. In this paper we optimize a counter measure for the AES block cipher consisting in transforming a boolean mask to a multiplicative mask prior to a ...
متن کاملMultiplicative Masking and Power Analysis of AES
The recently proposed multiplicative masking countermeasure against power analysis attacks on AES is interesting as it does not require the costly recomputation and RAM storage of S-boxes for every run of AES. This is important for applications where the available space is very limited such as the smart card applications. Unfortunately, it is here shown that this method is in fact inherently vu...
متن کاملProvably Secure Masking of AES
A general method to secure cryptographic algorithms against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking, using random values unknown to an adversary one masks the input to a cryptographic algorithm. As a result, the intermediate results in the algorithm computation are uncorrelated to the input and the adversary cannot obtain any use...
متن کاملEfficient Hardware Multiplicative Inverters
We propose two hardware inverters for calculating the multiplicative inverses in finite fields GF (2): one produces a result in every O(m) time using O(m) area; and the other produces a result in every O(1) time using O ( m ) area. While existing O(m)-time inverters require at least two shift registers in the datapath, the proposed O(m)-time implementation uses only one, thus costing less hardw...
متن کاملUtilizing Hardware AES Encryption for WSNs
Encryption is essential in many WSN applications. Several encryption frameworks exist which are mostly based on software algorithms. However, nearly every up-to-date radio transceiver chip is equipped with an integrated hardware encryption engine. With this Poster we show the benefits of utilizing an integrated hardware encryption engine in comparison to pure software-based solutions.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR Transactions on Cryptographic Hardware and Embedded Systems
سال: 2018
ISSN: 2569-2925
DOI: 10.46586/tches.v2018.i3.431-468