2006 International Conference on Field Programmable Logic and Applications 2006
DOI: 10.1109/fpl.2006.311315
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks

Abstract: This paper presents FPGA implementations of the DES and Triple-DES with improved security against power analysis attacks. The proposed designs use Boolean masking, a previously introduced technique to protect smart card implementations from these attacks. We demonstrate that recent reconfigurable devices offer excellent opportunities to implement a masked DES. In particular, we use the large embedded memories available in the Xilinx Virtex-II pro FPGAs to store precomputed and masked substitution tables. Compa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 10 publications
0
21
0
Order By: Relevance
“…Nonetheless, if S is a non-linear operation, this equality does not hold, and it is necessary to use judiciously both shares to be able to compute S(z). This operation is costly in general [26] (unless some algebraic properties of the non-linear function S can be taken advantage of [19]) and error-prone [13].…”
Section: Rationalementioning
confidence: 99%
“…Nonetheless, if S is a non-linear operation, this equality does not hold, and it is necessary to use judiciously both shares to be able to compute S(z). This operation is costly in general [26] (unless some algebraic properties of the non-linear function S can be taken advantage of [19]) and error-prone [13].…”
Section: Rationalementioning
confidence: 99%
“…The internal variable x does not exist as a net in the cryptosystem but can be reconstructed by a pair of signals (m, x m = x θ m) where x m is the masked variable and θ is an operation which can be Boolean or arithmetic. In the sequel, we consider the masked DES studied at UCL [21]; our variable x represents the right half of the LR register.…”
Section: B First Order Maskingmentioning
confidence: 99%
“…A solution in hardware consists in using a two-path implementation, one for the masked variable and one for the mask itself, as proposed in [13] on a Data Encryption Standard (DES) example illustrated in Fig. 1.…”
Section: State-of-the-artmentioning
confidence: 99%