Small size, low power, side channel-immune AES coprocessor: design and synthesis results

  • Authors:
  • Elena Trichina;Tymur Korkishko;Kyung Hee Lee

  • Affiliations:
  • Department of Computer Science, University of Kuopio, Kuopio, Finland;Information security TG, i-Networking Lab, Information Security Group, Samsung Advanced Institute of Technology, Korea;Information security TG, i-Networking Lab, Information Security Group, Samsung Advanced Institute of Technology, Korea

  • Venue:
  • AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit information such as time measurements, power consumption, and electromagnetic emission that leaks from a device when it executes cryptographic applications. When leaked information is correlated to a secret key, an adversary may be able to recover the key by monitoring this information. This paper describes an AES coprocessor that provides complete protection against first-order differential power analysis by embedding a widely used software countermeasure that decorrelates data being processed from the leaked information, so-called data masking, at a hardware level.