Analysis of S-Box Hardware Resources to Improve AES Intrinsic Security Against Power Attacks

IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE IEEE Embedded Systems Letters Pub Date : 2024-10-10 DOI:10.1109/LES.2024.3478070
Thockchom Birjit Singha;Roy Paily Palathinkal;Shaik Rafi Ahamed
{"title":"Analysis of S-Box Hardware Resources to Improve AES Intrinsic Security Against Power Attacks","authors":"Thockchom Birjit Singha;Roy Paily Palathinkal;Shaik Rafi Ahamed","doi":"10.1109/LES.2024.3478070","DOIUrl":null,"url":null,"abstract":"Side-channel attacks (SCAs) have rendered Internet of Things (IoT)-based devices unsafe despite employing Advanced Encryption Standard (AES) as the cryptographic algorithm. Additional circuitry, called countermeasures, is used to protect AES against the attacks at the cost of huge area and power overheads. The attacks are performed on SubBytes round operation of AES, which comprises of 16 S-boxes. This letter makes a novel attempt to boost the intrinsic security of an unprotected AES by analyzing four smallest composite field arithmetic (CFA)-based S-boxes available in literature, Circuit Minimization Team (CMT), Canright, Maximov, and Masoleh with lookup table (LUT)-based S-box as a reference. This letter proposes an AES design which is unprotected but with enhanced security. The designer can aim higher security by adding smaller countermeasure protective schemes before incorporating into IoT devices. A novel 3-D hardware analysis, namely, hardware resources, hardware complexity/linearity, and hardware security, is performed which demonstrates that lesser gate equivalent (GE) and linear gates of Masoleh S-box offer the highest security. Upon evaluation on Side-Channel Attack Standard Evaluation Board (SASEBO), all the hardware security metrics favored Masoleh S-box, depicting nearly \n<inline-formula> <tex-math>$94 \\times $ </tex-math></inline-formula>\n gain in security and 80% reduction in area with respect to other unprotected designs.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 4","pages":"525-528"},"PeriodicalIF":1.7000,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Embedded Systems Letters","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10713212/","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

Side-channel attacks (SCAs) have rendered Internet of Things (IoT)-based devices unsafe despite employing Advanced Encryption Standard (AES) as the cryptographic algorithm. Additional circuitry, called countermeasures, is used to protect AES against the attacks at the cost of huge area and power overheads. The attacks are performed on SubBytes round operation of AES, which comprises of 16 S-boxes. This letter makes a novel attempt to boost the intrinsic security of an unprotected AES by analyzing four smallest composite field arithmetic (CFA)-based S-boxes available in literature, Circuit Minimization Team (CMT), Canright, Maximov, and Masoleh with lookup table (LUT)-based S-box as a reference. This letter proposes an AES design which is unprotected but with enhanced security. The designer can aim higher security by adding smaller countermeasure protective schemes before incorporating into IoT devices. A novel 3-D hardware analysis, namely, hardware resources, hardware complexity/linearity, and hardware security, is performed which demonstrates that lesser gate equivalent (GE) and linear gates of Masoleh S-box offer the highest security. Upon evaluation on Side-Channel Attack Standard Evaluation Board (SASEBO), all the hardware security metrics favored Masoleh S-box, depicting nearly $94 \times $ gain in security and 80% reduction in area with respect to other unprotected designs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
S-Box硬件资源分析提高AES抗电源攻击的内在安全性
尽管采用高级加密标准(AES)作为加密算法,但侧信道攻击(sca)已经使基于物联网(IoT)的设备变得不安全。额外的电路,称为对抗措施,用于保护AES免受攻击,代价是巨大的面积和电力开销。攻击是对AES的SubBytes轮操作进行的,AES由16个s盒组成。这封信通过分析文献中可用的四个基于最小复合场算法(CFA)的S-box,电路最小化团队(CMT), Canright, Maximov和Masoleh以查找表(LUT)为基础的S-box作为参考,进行了一种新颖的尝试,以提高未受保护的AES的内在安全性。这封信提出了一个AES设计,它是不受保护的,但具有增强的安全性。设计人员可以在整合到物联网设备之前,通过添加更小的对抗保护方案来提高安全性。对硬件资源、硬件复杂性/线性度和硬件安全性进行了新颖的三维硬件分析,证明了Masoleh S-box的低栅极等效(GE)和线性栅极具有最高的安全性。在侧信道攻击标准评估委员会(SASEBO)的评估中,所有硬件安全指标都支持Masoleh S-box,与其他未受保护的设计相比,其安全性增加了近94倍,面积减少了80%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Embedded Systems Letters
IEEE Embedded Systems Letters Engineering-Control and Systems Engineering
CiteScore
3.30
自引率
0.00%
发文量
65
期刊介绍: The IEEE Embedded Systems Letters (ESL), provides a forum for rapid dissemination of latest technical advances in embedded systems and related areas in embedded software. The emphasis is on models, methods, and tools that ensure secure, correct, efficient and robust design of embedded systems and their applications.
期刊最新文献
Table of Contents Editorial IEEE Embedded Systems Letters Publication Information ViTSen: Bridging Vision Transformers and Edge Computing With Advanced In/Near-Sensor Processing Methodology for Formal Verification of Hardware Safety Strategies Using SMT
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1