Protecting secret keys in networked devices with table encoding against power analysis attacks

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 715
  • Download : 0
Nowadays, secret keys of networked devices are profoundly attacked by power analysis attacks, caused by the dramatic evolution of statistical analysis with a simple experimental setup. Recently, OpenSSL and CoreBitcoin running on Android and iOS have been broken by power analysis. Moreover, sensors and actuators can also be attacked thereby threatening user's privacy and security. To resolve these challenges, power-analysis-resistant implementations of cryptographic algorithms in networked devices have received a lot of attentions. Masking schemes have been developed to implement secure cryptographic algorithms against side-channel analysis (SCA) attacks. Technically, the first-order masking method is vulnerable to the second order differential power analysis (2ODPA) attacks, but the current solutions against 2ODPA are expensive to be implemented. Moreover, worse performance will be shown if the cryptographic algorithms include boolean and arithmetic operations. In this paper, we propose a new countermeasure scheme to resist SCA attacks. Our scheme randomizes all the intermediate values of block cipher by encoding functions in the algorithm to lookup table and makes it resistant to power analysis attack. We apply our scheme to the block cipher algorithm, HIGHT. Our protected implementation of HIGHT takes only 1.79 times compared to the straightforward algorithm, and it needs 25 kbytes to store lookup tables in memory.
Publisher
IOS PRESS
Issue Date
2016
Language
English
Article Type
Article
Citation

JOURNAL OF HIGH SPEED NETWORKS, v.22, no.4, pp.293 - 307

ISSN
0926-6801
DOI
10.3233/JHS-160550
URI
http://hdl.handle.net/10203/218231
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0