• DocumentCode
    3051685
  • Title

    Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells

  • Author

    Soydan, Sedat

  • Author_Institution
    Nat. Res. Inst. of Electron. & Cryptology, TUBITAK, Kocaeli, Turkey
  • fYear
    2010
  • fDate
    18-25 July 2010
  • Firstpage
    221
  • Lastpage
    227
  • Abstract
    Differential power analysis (DPA) attack is an important threat that researchers spend great effort to make crypto algorithms resistant against DPA attacks. A masked AES hardware has been implemented under the project of National ID Card Design, and a prototype of the chip has been manufactured in HHNEC´s 0.25 um eFlash process. Whole round analysis (WRA) of the hardware has shown that masked S-boxes of AES have zero-value (ZV) input DPA leakage. In order to determine whether the hardware has DPA leakage before manufacturing, an accurate power model in digital simulation with back-annotated netlist has been generated. In this paper, we show that DPA leakage can be reduced by inserting delay cells just before nets where the leakage is significantly high. Moreover, improvements achieved by inserting delay cells have been demonstrated with the help of generated power model by using the back-annotated netlist of the whole AES hardware, and this method gives more realistic results to determine the effectiveness of the improvements rather than in which only back-annotated netlist of the S-boxes has been used.
  • Keywords
    cryptography; digital simulation; microprocessor chips; DPA leakage analysis; advance encryption standard; back-annotated netlist; chip prototype; delay cells insertion; differential power analysis attack; digital simulation; eFlash process; masked s-box; whole round analysis; Correlation; Cryptography; Delay; Digital simulation; Hardware; Logic gates; Power demand; AES; DPA; S-box; Zero-Value Input DPA; delay cells; masking; whole round analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on
  • Conference_Location
    Venice
  • Print_ISBN
    978-1-4244-7517-9
  • Electronic_ISBN
    978-0-7695-4095-5
  • Type

    conf

  • DOI
    10.1109/SECURWARE.2010.43
  • Filename
    5633737