Add Add to Quick Collection

Please use this identifier to cite or link to this item :

FPGA Implementations of the AES Masked Against Power Analysis Attacks



Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. Masking is a particularly appealing countermeasure against such attacks since it increases the security to a well quantifiable level and can be implemented without modifying the underlying technology. Its main drawback is the performance overhead it implies. For example, due to prohibitive memory costs, the straightforward application of masking to the AES algorithm, with precomputed tables, is hardly practical. In this paper, we exploit both the increased size of state-of-the-art reconfigurable hardware devices and previous optimization techniques to minimize the memory occupation of software S-boxes, in order to provide an efficient FPGA implementation of the AES algorithm, masked against side-channel attacks. We describe two high throughput architectures, based on 32-bit and 128-bit datapaths that are suitable for Xilinx Virtex-5 devices. In this way, we demonstrate the possibility to efficiently combine technological advances with algorithmic optimizations in this context.

Informations complémentaires

: Accès libre
Publication Date : 2011
Document type : Communication à un colloque (Conference Paper) - (Présentation orale avec comité de sélection)
Conference : "Proceedings of COSADE 2011, International Workshop on Side-Channel Analysis and Secure Design", Darmstadt (Allemagne) (du 24/02/2011 au 25/02/2011)
Peer-reviewed :
Subject : FPGA ; AES


Handle :
98 Visitors 73 Hits 32 Downloads
File Size Access
PDF_01 91 -1 bytes free Download
  • PDF_01