Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA

  • Kim, Chang-Kyun (Institute Attached to ETRI) ;
  • Schlaffer, Martin (Institute for Applied Information Processing and Communications, Graz University of Technology) ;
  • Moon, Sang-Jae (School of Electrical Engineering and Computer Science, Kyungpook National University)
  • Received : 2007.05.24
  • Published : 2008.04.30

Abstract

In this paper, we first investigate the side channel analysis attack resistance of various FPGA hardware implementations of the ARIA block cipher. The analysis is performed on an FPGA test board dedicated to side channel attacks. Our results show that an unprotected implementation of ARIA allows one to recover the secret key with a low number of power or electromagnetic measurements. We also present a masking countermeasure and analyze its second-order side channel resistance by using various suitable preprocessing functions. Our experimental results clearly confirm that second-order differential side channel analysis attacks also remain a practical threat for masked hardware implementations of ARIA.

Keywords