Projects per year
Abstract
Side-channel attacks on hardware implementations of cryptographic algorithms have recently been the focus of much attention in the research community. Differential power analysis (DPA) has been shown to be particularly effective at retrieving secret information stored within an implementation. The design of DPA-resistant systems that are efficient in terms of speed and area poses a significant challenge. All-or-Nothing Transforms are cryptographic transforms, which are currently employed in numerous applications. We examine All-or-Nothing Encryption systems from the DPA perspective. This paper shows that All-or-Nothing cryptosystems, whilst not preventing side-channel leakage, do fundamentally inhibit DPA attacks. Furthermore, we develop extensions to the All-or-Nothing protocol to strengthen the DPA resistance of the cryptosystem, providing a practical alternative to masking countermeasures for symmetric ciphers.
Original language | English |
---|---|
Pages (from-to) | 291-304 |
Number of pages | 14 |
Journal | International Journal of Information Security |
Volume | 13 |
Issue number | 3 |
DOIs | |
Publication status | Published - Jun 2014 |
Keywords
- Side-channel attacks
- DPA
- All-or-Nothing Transforms
- POWER ANALYSIS ATTACKS
- SECURITY
Fingerprint
Dive into the research topics of 'All-or-Nothing Transforms as a countermeasure to differential side-channel analysis'. Together they form a unique fingerprint.Projects
- 1 Finished
-
SILENT: Rework of Side channels-theory and implications for society
Oswald, M. E. (Principal Investigator)
1/01/11 → 1/04/16
Project: Research