A side-channel analysis resistant description of the AES S-box

247Citations
Citations of this article
106Readers
Mendeley users who have this article in their library.
Get full text

Abstract

So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this article, we introduce a new masking countermeasure which is not only secure against first-order side-channel attacks, but which also leads to relatively small implementations compared to other masking schemes implemented in dedicated hardware. Our approach is based on shifting the computation of the finite field inversion in the AES S-box down to GF(4). In this field, the inversion is a linear operation and therefore it is easy to mask. Summarizing, the new masking scheme combines the concepts of multiplicative and additive masking in such a way that security against first-order side-channel attacks is maintained, and that small implementations in dedicated hardware can be achieved. ©International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Oswald, E., Mangard, S., Pramstaller, N., & Rijmen, V. (2005). A side-channel analysis resistant description of the AES S-box. In Lecture Notes in Computer Science (Vol. 3557, pp. 413–423). Springer Verlag. https://doi.org/10.1007/11502760_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free