DPA Resistant Hardware Implementation of AES Based on Random Masking
|School||National University of Defense Science and Technology|
|Course||Computer Science and Technology|
|Keywords||AES Random mask DPA Finite field Effective realization|
With AES to replace DES as a new generation of the Data Encryption Standard , AES is more and more widely in the field of security , for AES, a variety of malicious attacks are becoming more serious . Called power attacks bypass attack techniques has posed a huge threat to the AES . Therefore , the study of the anti -power attack AES protection technology has important theoretical significance and practical value . In this paper, based on related research , in-depth study of the principles of power attacks ; given an AES effective implementation ; based on the effective realization of proposed anti DPA attack protection solution based on a random mask AES ; this on the basis of resistance to DPA attacks hardware -based a random mask the AES . ( 1) study the principle of power attacks and anti -power attack techniques . Analysis of the principles of power attacks , can be more in-depth understanding of the weak links of the anti -power attack of the AES algorithm , the basis of study of the anti -power attack protection technology . (2) gives an effective implementation of the AES . Only nonlinear transformation in the AES - SubBytes transformation in the finite field GF (2 ~ 8) the inverse transition to the finite field GF (2 ~ 4) and on GF (2 ~ 2) , effectively reducing the hardware overhead , this effective program is also based on the basis of the a random mask AES protection technology . (3) proposed a random mask AES anti - DPA Attack protective technology program . Based on the effective implementation of AES , AES mask protection key - the finite field GF (2 ~ 8) byte mask to seek reversal replaced finite field GF (2 ~ 4) and GF (2 ~ 2) on a series of masked , effectively mask the AES protection . The theoretical analysis shows that all the intermediate results are hidden, to achieve the purpose of the anti- DPA attacks . ( 4) based the random mask AES against DPA attacks hardware implementation . The paper mask protection AES coprocessor - Masked AES and AES coprocessor mask protection - Unmasked AES . Compared Unmasked AES Masked AES decline in the performance of the chip area , maximum frequency , throughput , etc. , but the anti- DPA attack , enhanced safety performance .