Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
-
- LI Yang
- Department of Informatics, The University of Electro-Communications
-
- SAKIYAMA Kazuo
- Department of Informatics, The University of Electro-Communications
-
- KAWAMURA Shinichi
- Research Center for Information Security, National Institute of Advanced Industrial Science and Technology
-
- OHTA Kazuo
- Department of Informatics, The University of Electro-Communications
Search this article
Abstract
This paper shows two power analysis attacks against a software implementation of a first-order DPA resistant S-box algorithm that is based on the discrete Fourier Transform (DFT). The DPA resistant S-box algorithm based on DFT was proposed by Prouff et al. in 2006 and improved by Coron et al. in 2008, respectively. In our attacks against the improved one, we pre-process the power traces by separating them into two subgroups, so that each has a biased mask. For the separated power traces, two post analysis methods are proposed to identify the key. One is based on DPA attack against one subgroup, and the other utilizes the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm-level countermeasure to enhance the security of S-box calculation based on the DFT.
Journal
-
- IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
-
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A (1), 191-199, 2011
The Institute of Electronics, Information and Communication Engineers
- Tweet
Details 詳細情報について
-
- CRID
- 1390001206312381056
-
- NII Article ID
- 10027986756
-
- NII Book ID
- AA10826239
-
- ISSN
- 17451337
- 09168508
-
- Text Lang
- en
-
- Data Source
-
- JaLC
- Crossref
- CiNii Articles
- KAKEN
-
- Abstract License Flag
- Disallowed