Cryptology ePrint Archive: Report 2014/716

Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment

Amir Moradi

Abstract: In order to provide security against side-channel attacks a masking scheme which makes use of wire-tap codes has recently been proposed. The scheme benefits from the features of binary linear codes, and its application to AES has been presented in the seminal article. In this work with respect to the underlying scheme we re-iterate the fundamental operations of the AES cipher in a hopefully more understandable terminology. Considering an FPGA platform we address the challenges each AES operation incurs in terms of implementation complexity. We show different scenarios on how to realize the SubBytes operation as the most critical issue is to deal with the large S-boxes encoded by the underlying scheme. Constructing various designs to actualize a full AES-128 encryption engine of the scheme, we provide practical side-channel evaluations based on traces collected from a Spartan-6 FPGA platform. As a result, we show that despite nice features of the scheme - with respect to its area and power overhead its advantages are very marginal unless its fault-detection ability is also being employed.

Category / Keywords: implementation /

Original Publication (with minor differences): INDOCRYPT 2014

Date: received 12 Sep 2014

Contact author: amir moradi at rub de

Available format(s): PDF | BibTeX Citation

Version: 20140916:160938 (All versions of this report)

Short URL: ia.cr/2014/716

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]