A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software

  • Authors:
  • Ambuj Sinha;Zhimin Chen;Patrick Schaumont

  • Affiliations:
  • Virginia Tech;Virginia Tech;Virginia Tech

  • Venue:
  • WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as resistance against implementation attacks is mandatory. In this paper, we compare and contrast three different software implementations of AES. The first two are based on cryptographic lookup tables, while the third uses bit-slicing. We analyze the performance and side-channel resistance of each implementation on two different FPGA platforms, one based on a PowerPC processor, and the second based on a LEON-3 soft-core processor. Our measurements show that, on embedded platforms, a bit-sliced AES implementation does not always outperform a lookup-table based AES implementation. We also present a detailed analysis of the side-channel resistance and the source of side-channel leakage, and show that our bit-sliced implementation has eight times more side-channel leakage than the lookup-table implementations. Hence, we conclude that a variation on the implementation style for embedded software implementation of AES will not only affect performance, but also embedded system security.