Impact of sboxes size upon side channel resistance and block cipher design

2Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Designing a cryptographic algorithm requires to take into account various cryptanalytic threats. Since the 90's, Side Channel Analysis (SCA) has become a major threat against cryptographic algorithms embedded on physical devices. Protecting implementation of ciphers against such attacks is a very dynamic topic of research and many countermeasures have been proposed to thwart these attacks. The most common countermeasure for block cipher implementations is masking, which randomizes the variables by combining them with one or several random values. In this paper, we propose to investigate the impact of the size of the words processed by an algorithm on the security against SCA. For this matter we describe two AES-like algorithms operating respectively on 4 and 16-bit words. We then compare them with the regular AES (8 bits) both in terms of complexity and security with respect to various masking schemes. Our results show that SCA is a determinant criterion for algorithms design and that cryptographers may have various possibilities depending on their security and complexity requirements. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Goubin, L., Martinelli, A., & Walle, M. (2013). Impact of sboxes size upon side channel resistance and block cipher design. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7918 LNCS, pp. 240–259). Springer Verlag. https://doi.org/10.1007/978-3-642-38553-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free