Paper 2002/091

Multiplicative Masking and Power Analysis of AES

Jovan Dj. Golić

Abstract

The recently proposed multiplicative masking countermeasure against power analysis attacks on AES is interesting as it does not require the costly recomputation and RAM storage of S-boxes for every run of AES. This is important for applications where the available space is very limited such as the smart card applications. Unfortunately, it is here shown that this method is in fact inherently vulnerable to differential power analysis. Other possible random masking methods are also discussed.

Metadata
Available format(s)
PS
Category
Secret-key cryptography
Publication info
Published elsewhere. Presented at (internal) Gemplus Quarterly meeting, La Ciotat, France, October 30-31, 2001.
Keywords
AESdifferential power analysiscountermeasuresmultiplicative masking
Contact author(s)
jovan golic @ gemplus com
History
2002-07-08: received
Short URL
https://ia.cr/2002/091
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2002/091,
      author = {Jovan Dj.  Golić},
      title = {Multiplicative Masking and Power Analysis of AES},
      howpublished = {Cryptology ePrint Archive, Paper 2002/091},
      year = {2002},
      note = {\url{https://eprint.iacr.org/2002/091}},
      url = {https://eprint.iacr.org/2002/091}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.