
Research on a high‐order AES mask anti‐power attack
Author(s) -
Ou Yu,
Li Lang
Publication year - 2020
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2019.0602
Subject(s) - power analysis , side channel attack , s box , advanced encryption standard , computer science , cryptography , multiplication (music) , encryption , scheme (mathematics) , aes implementations , inversion (geology) , implementation , arithmetic , algorithm , mathematics , computer security , block cipher , mathematical analysis , paleontology , combinatorics , structural basin , biology , programming language
The cryptographic algorithm has been gradually improved in design, but its implementations are vulnerable to side‐channel analysis (SCA). Generally speaking, adding a mask to the primitive is the best way to counteract SCA. In the high‐order mask, the key to affecting performance and security lies in the multiplication design. Based on the research of the advanced encryption standard (AES) algorithm, internal round function structure, and zero‐knowledge proof, a high‐order AES mask scheme is designed to optimise the implementation. In this scheme, the substitution‐box protects sensitive variables in the algorithm with the use of secure multiplication and secure inversion by column. The scheme named as in columns higher‐order mask (ICHM), features low cost and high security. The result of the experiment proves the security and effectiveness of the ICHM.