Low-Latency Hardware Masking with Application to AES

During the past two decades there has been a great deal of research published on masked hardware implementations of AES and other cryptographic primitives. Unfortunately, many hardware masking techniques can lead to increased latency compared to unprotected circuits for algorithms such as AES, due t...

Full description

Bibliographic Details
Main Authors: Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2020-03-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/8553
_version_ 1819087186546393088
author Pascal Sasdrich
Begül Bilgin
Michael Hutter
Mark E. Marson
author_facet Pascal Sasdrich
Begül Bilgin
Michael Hutter
Mark E. Marson
author_sort Pascal Sasdrich
collection DOAJ
description During the past two decades there has been a great deal of research published on masked hardware implementations of AES and other cryptographic primitives. Unfortunately, many hardware masking techniques can lead to increased latency compared to unprotected circuits for algorithms such as AES, due to the high-degree of nonlinear functions in their designs. In this paper, we present a hardware masking technique which does not increase the latency for such algorithms. It is based on the LUT-based Masked Dual-Rail with Pre-charge Logic (LMDPL) technique presented at CHES 2014. First, we show 1-glitch extended strong noninterference of a nonlinear LMDPL gadget under the 1-glitch extended probing model. We then use this knowledge to design an AES implementation which computes a full AES-128 operation in 10 cycles and a full AES-256 operation in 14 cycles. We perform practical side-channel analysis of our implementation using the Test Vector Leakage Assessment (TVLA) methodology and analyze univariate as well as bivariate t-statistics to demonstrate its DPA resistance level.
first_indexed 2024-12-21T21:32:09Z
format Article
id doaj.art-743449c04bbe4a3da1b7f8c09bc2c47c
institution Directory Open Access Journal
issn 2569-2925
language English
last_indexed 2024-12-21T21:32:09Z
publishDate 2020-03-01
publisher Ruhr-Universität Bochum
record_format Article
series Transactions on Cryptographic Hardware and Embedded Systems
spelling doaj.art-743449c04bbe4a3da1b7f8c09bc2c47c2022-12-21T18:49:36ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252020-03-012020210.13154/tches.v2020.i2.300-326Low-Latency Hardware Masking with Application to AESPascal Sasdrich0Begül Bilgin1Michael Hutter2Mark E. Marson3Rambus Cryptography Research, 425 Market Street, 11th Floor, San Francisco, CA 94105, United StatesRambus Cryptography Research, 425 Market Street, 11th Floor, San Francisco, CA 94105, United StatesRambus Cryptography Research, 425 Market Street, 11th Floor, San Francisco, CA 94105, United StatesRambus Cryptography Research, 425 Market Street, 11th Floor, San Francisco, CA 94105, United StatesDuring the past two decades there has been a great deal of research published on masked hardware implementations of AES and other cryptographic primitives. Unfortunately, many hardware masking techniques can lead to increased latency compared to unprotected circuits for algorithms such as AES, due to the high-degree of nonlinear functions in their designs. In this paper, we present a hardware masking technique which does not increase the latency for such algorithms. It is based on the LUT-based Masked Dual-Rail with Pre-charge Logic (LMDPL) technique presented at CHES 2014. First, we show 1-glitch extended strong noninterference of a nonlinear LMDPL gadget under the 1-glitch extended probing model. We then use this knowledge to design an AES implementation which computes a full AES-128 operation in 10 cycles and a full AES-256 operation in 14 cycles. We perform practical side-channel analysis of our implementation using the Test Vector Leakage Assessment (TVLA) methodology and analyze univariate as well as bivariate t-statistics to demonstrate its DPA resistance level.https://tches.iacr.org/index.php/TCHES/article/view/8553AESLow-Latency HardwareLMDPLMaskingSecure Logic StylesDifferential Power Analysis
spellingShingle Pascal Sasdrich
Begül Bilgin
Michael Hutter
Mark E. Marson
Low-Latency Hardware Masking with Application to AES
Transactions on Cryptographic Hardware and Embedded Systems
AES
Low-Latency Hardware
LMDPL
Masking
Secure Logic Styles
Differential Power Analysis
title Low-Latency Hardware Masking with Application to AES
title_full Low-Latency Hardware Masking with Application to AES
title_fullStr Low-Latency Hardware Masking with Application to AES
title_full_unstemmed Low-Latency Hardware Masking with Application to AES
title_short Low-Latency Hardware Masking with Application to AES
title_sort low latency hardware masking with application to aes
topic AES
Low-Latency Hardware
LMDPL
Masking
Secure Logic Styles
Differential Power Analysis
url https://tches.iacr.org/index.php/TCHES/article/view/8553
work_keys_str_mv AT pascalsasdrich lowlatencyhardwaremaskingwithapplicationtoaes
AT begulbilgin lowlatencyhardwaremaskingwithapplicationtoaes
AT michaelhutter lowlatencyhardwaremaskingwithapplicationtoaes
AT markemarson lowlatencyhardwaremaskingwithapplicationtoaes