Differential side channel analysis attacks on FPGA implementions of ARIA

28Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we first investigate the side channel analysis attack resistance of various FPGA hardware implementations of the ARIA block cipher. The analysis is performed on an FPGA test board dedicated to side channel attacks. Our results show that an unprotected implementation of ARIA allows one to recover the secret key with a low number of power or electromagnetic measurements. We also present a masking countermeasure and analyze its second-order side channel resistance by using various suitable preprocessing functions. Our experimental results clearly confirm that second-order differential side channel analysis attacks also remain a practical threat for masked hardware implementations of ARIA.

Cite

CITATION STYLE

APA

Kim, C. K., Schläffer, M., & Moon, S. J. (2008). Differential side channel analysis attacks on FPGA implementions of ARIA. ETRI Journal, 30(2), 315–325. https://doi.org/10.4218/etrij.08.0107.0167

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free