In this paper, we first investigate the side channel analysis attack resistance of various FPGA hardware implementations of the ARIA block cipher. The analysis is performed on an FPGA test board dedicated to side channel attacks. Our results show that an unprotected implementation of ARIA allows one to recover the secret key with a low number of power or electromagnetic measurements. We also present a masking countermeasure and analyze its second-order side channel resistance by using various suitable preprocessing functions. Our experimental results clearly confirm that second-order differential side channel analysis attacks also remain a practical threat for masked hardware implementations of ARIA.
CITATION STYLE
Kim, C. K., Schläffer, M., & Moon, S. J. (2008). Differential side channel analysis attacks on FPGA implementions of ARIA. ETRI Journal, 30(2), 315–325. https://doi.org/10.4218/etrij.08.0107.0167
Mendeley helps you to discover research relevant for your work.