Paper 2005/087
AES side channel attack protection using random isomorphisms
A. G. Rostovtsev and O. V. Shemyakina
Abstract
General method of side-channel attacks protection, based on random cipher isomorphisms is presented. Isomorphic ciphers produce common outputs for common inputs. Cipher isomorphisms can be changed independently on transmitting and receiving sides. Two methods of RIJNDAEL protection are considered. The first one is based on random commutative isomorphisms of underlying structure. The set of field F256 isomorphisms consists of 30 subsets; each of them has 8 commutative elements presented as Galois group elements. This allows increasing the strength with respect to side channel attacks about 32 times, the encryption ratio decreases slightly. This method has relatively small efficiency. The second method is based on cipher byte affine isomorphisms s(x)= Lx+a, and allows in practice eliminate side-channel attacks. The rate of this method is approximately the same as in previous case. The most convenient affine isomorphisms are involutions. Method of such affine isomorphisms generation is presented.
Note: Isomorphic ciphers produce common output for common input but in general use different methods. If adversary knows first round input and output but does not know masked method, he cannot find round key. Universal approach for cipher protection is presented.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. The paper was not published earlier.
- Keywords
- AESblock ciphersfinite fieldrandom isomorphismside-channel attack
- Contact author(s)
- rostovtsev @ ssl stu neva ru
- History
- 2005-03-20: received
- Short URL
- https://ia.cr/2005/087
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2005/087, author = {A. G. Rostovtsev and O. V. Shemyakina}, title = {{AES} side channel attack protection using random isomorphisms}, howpublished = {Cryptology {ePrint} Archive, Paper 2005/087}, year = {2005}, url = {https://eprint.iacr.org/2005/087} }