DOI QR코드

DOI QR Code

Implementation of Optimized 1st-Order Masking AES Algorithm Against Side-Channel-Analysis

부채널 분석 대응을 위한 1차 마스킹 AES 알고리즘 최적화 구현

  • Received : 2019.07.05
  • Accepted : 2019.08.07
  • Published : 2019.09.30

Abstract

Recently, with the development of Internet technology, various encryption algorithms have been adopted to protect the sensing data measured by hardware devices. The Advanced Encryption Standard (AES), the most widely used encryption algorithm in the world, is also used in many devices with strong security. However, it has been found that the AES algorithm is vulnerable to side channel analysis attacks such as Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). In this paper, we present a software optimization implementation technique of the AES algorithm applying the most widely known masking technique among side channel analysis attack methods.

최근 사물인터넷 기술의 발전과 함께 하드웨어 디바이스에서 측정하는 센싱 데이터를 보호하기 위해 다양한 방식의 암호화 알고리즘을 채택하고 있다. 그 중 전 세계에서 가장 많이 사용하는 암호화 알고리즘인 AES(Advanced Encryption Standard) 또한 강력한 안전성을 바탕으로 많은 디바이스에서 사용되고 있다. 하지만 AES 알고리즘은 DPA(Differential Power Analysis), CPA(Correlation Power Analysis) 같은 부채널 분석 공격에 취약하다는 점이 발견되었다. 본 논문에서는 부채널 분석 공격 대응방법 중 가장 널리 알려진 마스킹 기법을 적용한 AES 알고리즘의 소프트웨어 최적화 구현 기법을 제시한다.

Keywords

References

  1. Moon Si-hoon, Kim Min-woo, and Kwon Tae-kyung, "Trends in Lightweight Crypto Technology for IoT Communication Environments," The Journal of The Korean Institute of Communication Sciences, Vol.33, No.3, pp.80-86, 2016.
  2. Hwajeong Seo and Howon Kim, "Implementation of Lightweight Encryption Algorithms for the Internet of Things," REVIEW OF KIISC, Vol.25, No.2, pp.12-19, 2015
  3. P. C. Kocher, "Timing Attacks on Implementation of Diffe-Hellman, RSA, DSS and Other Systems," Proc. Adv. Cryptology, pp.104-113, 1996.
  4. E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," Proceedings of Crypto 1997, LNCS 1294, pp.513-525, Aug. 1997.
  5. J. Quisquater and D. Samyde, "Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards," Proc. e-Smart, pp.200-210, 2001,
  6. National Institute of Standards and Technology, "Advanced Encryption Standards," NIST FIPS PUB 197, 2001.
  7. R. Rivest, A. Shamir, and L, Adelman, "A method for obtaining digital signature and public-key cryptosystems," Comm. of the ACM 21, pp.120-126, 1978. https://doi.org/10.1145/359340.359342
  8. D. Hong, J. Lee, D. Kim, D. Kwon, K. Ryu, and D. Lee, "LEA, A 128-bit block cipher for fast encryption on common processors," WISA'13, LNCS 8267, pp.3-27, 2014.
  9. TTA, "128-bit lightweight block cipher LEA," TTAK.KO-12.0223, Dec, 2013.
  10. D. Kwon, J. Kim, S. Park, S. Sung, Y. Sohn, J. Song, Y. Yeom, E. Yoon, S. Lee, J.Lee, S. Chee, D. Han, and J. Hong, New Block Cipher : ARIA In ICISC'03, LNCS 2971, pp. 432-445, Springer-Verlag, 2003.
  11. Y. Kim and H. Yoon, "First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA," IACR Cryptology ePrint Archive, 2014:999, Available at https://eprint.iacr.org/2014/999.pdf
  12. J. Park, T. Kim, H. An, Y. Won, and D. Han, "Side channel attacks on LEA and its countermeasures," Journal of The Korea Institute of Information Security & Cryptology (JKIISC), Vol.25, No.2, pp.449-456, 2015. https://doi.org/10.13089/JKIISC.2015.25.2.449
  13. JungKab Seo, ChangKyun Kim, JaeCheol Ha, SangJae Moon, and IlHwan Park, "Differential Power Analysis Attack of a Block Cipher ARIA," Journal of the Korea Institute of Information Security & Cryptology(Korea Institute Of Information Security And Cryptology), Vol.15, No.1, pp.99-107, 2005.
  14. HyungSo Yoo, JaeCheol-Ha, ChangKyun Kim, IlHwan Park, and SangJae Moon, "A Secure ARIA implementation resistant to Differential Power Attack using Random Masking Method," Journal of the Korea Institute of Information Security & Cryptology, Vol.16, No.2, pp.129-139, 2006.
  15. ChangKyun Kim, JaeHoon Park, Daewan Han, and Dong Hoon Lee, "Investigation of Masking Based Side Channel Countermeasures for LEA," Journal of the Korea Institute of Information Security & Cryptology, Vol.26, No.6, pp.1431-1441, 2016. https://doi.org/10.13089/JKIISC.2016.26.6.1431
  16. L. Goubin and J.Patarin, "DES and Differential Power Analysis - The Duplication Method," CHES 1999, LNCS 1717, pp.158-172, Springer, 1999
  17. Paul Kocher, Joshua Jaffe, and Benjamin Jun, "Differential Power Analysis," CRYPTO '99, Springer-Verlag, 1999, pp.388-397.
  18. Eric Brier, Christophe Clavier, and Francis Olivier, "Correlation Power Analysis with a Leakage Model," CHES 2004: Cryptographic Hardware and Embedded Systems - CHES 2004, pp.16-29.
  19. C. Herbst, E. Oswald, and S. Mangard, An AES Smart Card Implementation Resistant to Power Analysis Attacks. Lecture Notes in Computer Science, pp.239-252, 2006.