ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks
Cited 3 time in scopus Download 4 time Share share facebook twitter linkedin kakaostory
저자
김태성, 이승광, 최두호, 윤현수
발행일
201610
출처
Journal of High Speed Networks, v.22 no.4, pp.293-307
ISSN
0926-6801
출판사
IOS
DOI
https://dx.doi.org/10.3233/JHS-160550
초록
Nowadays, secret keys of networked devices are profoundly attacked by power analysis attacks, caused by the dramatic evolution of statistical analysis with a simple experimental setup. Recently, OpenSSL and CoreBitcoin running on Android and iOS have been broken by power analysis. Moreover, sensors and actuators can also be attacked thereby threatening user's privacy and security. To resolve these challenges, power-analysis-resistant implementations of cryptographic algorithms in networked devices have received a lot of attentions. Masking schemes have been developed to implement secure cryptographic algorithms against side-channel analysis (SCA) attacks. Technically, the firstorder masking method is vulnerable to the second order differential power analysis (2ODPA) attacks, but the current solutions against 2ODPA are expensive to be implemented. Moreover, worse performance will be shown if the cryptographic algorithms include boolean and arithmetic operations. In this paper, we propose a new countermeasure scheme to resist SCA attacks. Our scheme randomizes all the intermediate values of block cipher by encoding functions in the algorithm to lookup table and makes it resistant to power analysis attack. We apply our scheme to the block cipher algorithm, HIGHT. Our protected implementation of HIGHT takes only 1.79 times compared to the straightforward algorithm, and it needs 25 kbytes to store lookup tables in memory.
KSP 제안 키워드
Arithmetic operations, Block cipher algorithm, Boolean and, Cryptographic Algorithms, Differential Power Analysis, Intermediate values, Masking method, Networked devices, Protected implementation, Sensors and Actuators, Side Channel Analysis