Toward more efficient DPA-resistant AES hardware architecture based on threshold implementation

R Ueno, N Homma, T Aoki - … on Constructive Side-Channel Analysis and …, 2017 - Springer
R Ueno, N Homma, T Aoki
International Workshop on Constructive Side-Channel Analysis and Secure Design, 2017Springer
This paper presents a highly efficient AES hardware architecture resistant to differential
power analyses (DPAs) on the basis of threshold implementation (TI). In contrast to other
conventional masking schemes, the major feature of TI is to guarantee DPA-resistance
under d-probing condition at the resister-transfer level (RTL). On the other hand, TI utilizes
pipelining techniques between the non-linear functions to avoid propagating glitches, which
would lead to non-negligible overheads of circuit area and latency. In this paper, we first …
Abstract
This paper presents a highly efficient AES hardware architecture resistant to differential power analyses (DPAs) on the basis of threshold implementation (TI). In contrast to other conventional masking schemes, the major feature of TI is to guarantee DPA-resistance under d-probing condition at the resister-transfer level (RTL). On the other hand, TI utilizes pipelining techniques between the non-linear functions to avoid propagating glitches, which would lead to non-negligible overheads of circuit area and latency. In this paper, we first propose a compact first-order TI-based AES S-box which has a major effect on the performance and DPA-resistance of AES hardware. The proposed S-box exploits a state-of-the-art TI construction with shares in addition to the algebraic characteristics of AES S-box. We then propose an efficient AES hardware architecture suitable with the above TI-based S-box. The architectural advantage is given by register-retiming and tower-field arithmetic techniques. The performance of the proposed AES hardware was evaluated in comparison with that of conventional best ones. The logic synthesis result suggests that the proposed AES hardware architecture achieves more compact and 11–21% lower-latency than the conventional ones, which indicates that the proposed architecture can perform encryption based on TI with the lowest-energy. We also confirm the DPA-resistance of the proposed AES hardware by the Test Vector Leakage Assessment (TVLA) methodology with its FPGA implementation.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果