2010
DOI: 10.4218/etrij.10.0109.0181
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES

Abstract: In this paper, we propose efficient masking methods for ARIA and AES. In general, a masked S-box (MS) block can be constructed in different ways depending on the implementation platform, such as hardware and software. However, the other components of ARIA and AES have less impact on the implementation cost. We first propose an efficient masking structure by minimizing the number of mask corrections under the assumption that we have an MS block. Second, to make a secure and efficient MS block for ARIA and AES, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…In the first two NMA operations in each round, the CarryCorrection function performs the following algorithm by using λ and the carry tables, C 1 and C 2 , generated before en/decryption. A similar idea was published in [15]. However, our idea reduces RAM usage rather than ROM usage because we exploit the relation between two S-boxes rather than the relation between an S-box and its inverse; RAM is typically much more expensive than ROM.…”
Section: Carry Correction Function: Carrycorrectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the first two NMA operations in each round, the CarryCorrection function performs the following algorithm by using λ and the carry tables, C 1 and C 2 , generated before en/decryption. A similar idea was published in [15]. However, our idea reduces RAM usage rather than ROM usage because we exploit the relation between two S-boxes rather than the relation between an S-box and its inverse; RAM is typically much more expensive than ROM.…”
Section: Carry Correction Function: Carrycorrectionmentioning
confidence: 99%
“…We first show the equation between S 1 and S 2 as follows, where B is an 8×8 matrix such that B(x)=x 2 : ( ) (( ) ) ( ( ( ) )) ( ( ( ) )) ( ) ( ) ( ) ( ) . A similar idea was published in [15]. However, our idea reduces RAM usage rather than ROM usage because we exploit the relation between two S-boxes rather than the relation between an S-box and its inverse; RAM is typically much more expensive than ROM.…”
Section: New Equation Of Masked S-box To Reduce Ram Sizementioning
confidence: 99%
“…Although it is possible to compute this m a value without the exposure of intermediate values, this method requires both memory (to keep track of all mask values) and a large number of operations. To fulfill this function, a first-order masked AES generally generates an MS table by computing MS(x  m) = S(x)  m with new random numbers m and m before an encryption or decryption, as shown in Algorithm 1 [5], [7]. 4 and k Nr  masked by (m||m||m||m) 4 where (a 3 ||a 2 ||a 1 ||a 0 ) 4 is (2 96 + 2 64 + 2 32 + 1) (a 3 2 24 + a 2 2 16 + a 1 2 8 + a 0 ) (a survey is given in […”
Section: First-order Masked Aesmentioning
confidence: 99%
“…During the past few years, much of the research on DPA attacks has focused on finding secure countermeasures. Among these countermeasures, a masking method based on algorithmic techniques is known to be inexpensive and secure against a first-order DPA (FODPA) [3,5,9,11,15,16].…”
Section: Introductionmentioning
confidence: 99%