Cryptology ePrint Archive: Report 2015/786
Buying AES Design Resistance with Speed and Energy
Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto
Abstract: Fault and power attacks are two common ways of extracting secrets from tamper-resistant chips. Although several protections have been proposed to thwart these attacks, resistant designs usually claim significant area or speed overheads. Furthermore, circuit-level countermeasures are usually not reconfigurable at runtime. This paper exploits the AES’ algorithmic features to propose low-cost and low-latency protections.
We provide Verilog and FPGA implementation details. Using our design, real-life applications can be configured during runtime to meet the user’s needs and the system’s constraints.
Category / Keywords: implementation / side channel attacks, fault attacks, AES
Date: received 6 Aug 2015, last revised 10 Aug 2015
Contact author: david naccache at ens fr
Available format(s): PDF | BibTeX Citation
Version: 20150810:071922 (All versions of this report)
Short URL: ia.cr/2015/786
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]