DOI QR코드

DOI QR Code

Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique

  • Kang, Jun-Ki (Cyber Security-Convergence Research Department, ETRI, University of Science and Technology) ;
  • Choi, Doo-Ho (Cyber Security-Convergence Research Department, ETRI) ;
  • Choi, Yong-Je (Cyber Security-Convergence Research Department, ETRI) ;
  • Han, Dong-Guk (Department of Mathematics, Kookmin University)
  • Received : 2011.04.25
  • Accepted : 2011.09.06
  • Published : 2012.02.01

Abstract

The block cipher ARIA has been threatened by side-channel analysis, and much research on countermeasures of this attack has also been produced. However, studies on countermeasures of ARIA are focused on software implementation, and there are no reports about hardware designs and their performance evaluation. Therefore, this article presents an advanced masking algorithm which is strong against second-order differential power analysis (SODPA) and implements a secure ARIA hardware. As there is no comparable report, the proposed masking algorithm used in our hardware module is evaluated using a comparison result of software implementations. Furthermore, we implement the proposed algorithm in three types of hardware architectures and compare them. The smallest module is 10,740 gates in size and consumes an average of 47.47 ${\mu}W$ in power consumption. Finally, we make ASIC chips with the proposed design, and then perform security verification. As a result, the proposed module is small, energy efficient, and secure against SODPA.

Keywords

References

  1. P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. CRYPTO, LNCS, vol. 1666, 1999, pp. 388-397.
  2. S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, 2007.
  3. T. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistance Software," Proc. CHES, LNCS, vol. 1965, 2000, pp. 238-251.
  4. National Security Research Institute: The ARIA Specification, http://210.104.33.10/ARIA/index-e.html
  5. D. Kwon et al., "New Block Cipher: ARIA," Proc. ICISC, LNCS, vol. 2971, Nov. 2003, pp. 432-445.
  6. S. Lee, S. Moon, and J. Kim, "High-Speed Hardware Architectures for ARIA with Composite Field Arithmetic and Area-Throughput Trade-Offs," ETRI J., vol. 30, no. 5, Oct. 2008, 2008, pp. 696-706.
  7. H. Kim et al., "Efficient Masking Method Appropriate for the Block Ciphers ARIA and AES," ETRI J., vol. 32, no. 3, June 2010, pp. 370-379.
  8. C. Kim, M. Schläfferm, and S. Moon, "Differential Side Channel Analysis Attack on FPGA Implementations of ARIA," ETRI J., vol. 30, no. 2, Apr. 2008, pp. 315-325.
  9. W. Li, D. Gu, and J. Li, "Differential Fault Analysis on the ARIA Algorithm," Info. Sci., vol. 178, no. 19, 2008, pp. 3727-3737.
  10. H. Yoo et al., "A Secure Masking-Based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack," J. KIISC, vol. 16, 2006, pp. 143-155.
  11. J. Park et al., "Low Power Compact Design of ARIA Block Cipher," Proc. ISCAS, IEEE, 2006, pp. 313-316.
  12. S. Yang, J. Park, and Y. You, "The Smallest ARIA Module with 16-Bit Architecture," Proc. ICISC, LNCS, vol. 4296, 2006, pp. 107-117.
  13. B. Koo et al., "Design and Implementation of Unified Hardware for 128-Bit Block Ciphers ARIA and AES," ETRI J., vol. 29, no. 6, Dec. 2007, pp. 820-822.
  14. A. Satoh et al., "A Compact Rijndael Hardware Architecture with S-Box Optimization," Proc. ASIACRYPTO, LNCS, vol. 2248, 2001, pp. 239-254.
  15. J. Wolkerstorfer, E. Oswald, and M. Lamberger, "An ASIC Implementation of the AES S-Boxes," Proc. CT-RSA, LNCS, vol. 2271, 2002, pp. 67-78.
  16. P. Chodowiec and K. Gaj, "Very Compact FPGA Implementation of the AES Algorithm," Proc. CHES, LNCS, vol. 2779, 2003, pp. 319-333.
  17. E. Oswald et al., "A Side-Channel Analysis Resistant Description of the AES S-Box," Proc. FSE, LNCS, vol. 3557, 2005, pp. 413- 423.
  18. B. Zakeri et al., "Compact and Secure Design of Masked AES SBox," LNCS, vol. 4861, 2007, pp. 216-229.
  19. M. Feldhofer, S. Dominikus, and J. Wolkerstofer, "Strong Authentication for RFID System Using the AES Algorithm," Proc. CHES, LNCS, vol. 3156, 2004, pp. 357-370.
  20. E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model," Proc. CHES, LNCS, vol. 3156, 2004, pp. 135-152.

Cited by

  1. 해밍 웨이트 누출 기반 ARIA 키 확장 SPA vol.25, pp.6, 2012, https://doi.org/10.13089/jkiisc.2015.25.6.1319