Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

This paper presents a highly efficient AES hardware architecture resistant to differential power analyses (DPAs) on the basis of threshold implementation (TI). In contrast to other conventional masking schemes, the major feature of TI is to guarantee DPA-resistance under d-probing condition at the resister-transfer level (RTL). On the other hand, TI utilizes pipelining techniques between the non-linear functions to avoid propagating glitches, which would lead to non-negligible overheads of circuit area and latency. In this paper, we first propose a compact first-order TI-based AES S-box which has a major effect on the performance and DPA-resistance of AES hardware. The proposed S-box exploits a state-of-the-art TI construction with d+1 shares in addition to the algebraic characteristics of AES S-box. We then propose an efficient AES hardware architecture suitable with the above TI-based S-box. The architectural advantage is given by register-retiming and tower-field arithmetic techniques. The performance of the proposed AES hardware was evaluated in comparison with that of conventional best ones. The logic synthesis result suggests that the proposed AES hardware architecture achieves more compact and 11–21% lower-latency than the conventional ones, which indicates that the proposed architecture can perform encryption based on TI with the lowest-energy. We also confirm the DPA-resistance of the proposed AES hardware by the Test Vector Leakage Assessment (TVLA) methodology with its FPGA implementation.

Original languageEnglish
Title of host publicationConstructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Revised Selected Papers
EditorsSylvain Guilley
PublisherSpringer-Verlag
Pages50-64
Number of pages15
ISBN (Print)9783319646466
DOIs
Publication statusPublished - 2017 Jan 1
Event8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017 - Paris, France
Duration: 2017 Apr 132017 Apr 14

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10348 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017
CountryFrance
CityParis
Period17/4/1317/4/14

Keywords

  • AES
  • DPA
  • Hardware implementation
  • Side-channel attacks
  • Threshold implementation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation'. Together they form a unique fingerprint.

  • Cite this

    Ueno, R., Homma, N., & Aoki, T. (2017). Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation. In S. Guilley (Ed.), Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Revised Selected Papers (pp. 50-64). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10348 LNCS). Springer-Verlag. https://doi.org/10.1007/978-3-319-64647-3_4