Efficient Masking Method to Protect SEED Against Power Analysis Attack


The KIPS Transactions:PartC, Vol. 17, No. 3, pp. 233-242, Jun. 2010
10.3745/KIPSTC.2010.17.3.233,   PDF Download:

Abstract

In the recent years, power attacks were widely investigated, and so various countermeasures have been proposed. In the case of block ciphers, masking methods that blind the intermediate results in the algorithm computations(encryption, decryption) are well-known. In case of SEED block cipher, it uses 32 bit arithmetic addition and S-box operations as non-linear operations. Therefore the masking type conversion operations, which require some operating time and memory, are required to satisfy the masking method of all non-linear operations. In this paper, we propose a new masked S-boxes that can minimize the number of the masking type conversion operation. Moreover we construct just one masked S-box table and propose a new formula that can compute the other masked S-box's output by using this S-box table. Therefore the memory requirements for masked S-boxes are reduced to half of the existing masking method's one.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. I. Cho, H. S. Kim, D. H. Choi, D. G. Han, S. H. Hong, O. Y. Yi, "Efficient Masking Method to Protect SEED Against Power Analysis Attack," The KIPS Transactions:PartC, vol. 17, no. 3, pp. 233-242, 2010. DOI: 10.3745/KIPSTC.2010.17.3.233.

[ACM Style]
Young In Cho, Hee Seok Kim, Doo Ho Choi, Dong Guk Han, Seok Hie Hong, and Ok Yeon Yi. 2010. Efficient Masking Method to Protect SEED Against Power Analysis Attack. The KIPS Transactions:PartC, 17, 3, (2010), 233-242. DOI: 10.3745/KIPSTC.2010.17.3.233.