2001
DOI: 10.1007/3-540-44709-1_26
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of DES and AES, Secure against Some Attacks

Abstract: Abstract. Since Power Analysis on smart cards was introduced by Paul Kocher [7], many countermeasures have been proposed to protect implementations of cryptographic algorithms. In this paper we propose a new protection principle: the transformed masking method. We apply this method to protect two of the most popular block ciphers: DES and the AES Rijndael. To this end we introduce some transformed S-boxes for DES and a new masking method and its applications to the non-linear part of Rijndael.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
251
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 392 publications
(265 citation statements)
references
References 7 publications
0
251
0
Order By: Relevance
“…Another big advantage with our approach is that robust software countermeasures (like those described in [2]) can be implemented to compensate for any side-channel information leakage.…”
Section: Functional Simulation Of Vectorised Aesmentioning
confidence: 99%
See 1 more Smart Citation
“…Another big advantage with our approach is that robust software countermeasures (like those described in [2]) can be implemented to compensate for any side-channel information leakage.…”
Section: Functional Simulation Of Vectorised Aesmentioning
confidence: 99%
“…For security, counter-measures have been proposed, most of which are software-based leading to bulkier codes and slower programs. A hardware-software co-design approach is being undertaken by other researchers [2,3,4] in order to have a hardware that would reduce the cost of those software counter-measures.…”
Section: Introductionmentioning
confidence: 99%
“…The first attack consists in directly interpreting power consumption measurements and the second attack also involves statistical tests. From then on, many papers describing either countermeasures or attack improvements have been published (see [1,4,6,21] for example).…”
Section: Introductionmentioning
confidence: 99%
“…the calls to the S-Boxes). Indeed, all the other operations are more or less linear and can be protected in a straightforward manner (see [1] for instance). To protect the calculus of the output of an S-Box against DPA, three main kinds of methods have been proposed in the literature.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation