Speedup Higher-Order Masking of AES sing Normal Basis and SIMD

被引:0
|
作者
Miyajan, Abdulaziz [1 ]
Huang, Chun-Hsi [1 ]
Al-Somani, Turki F. [2 ]
机构
[1] Univ Connecticut, Comp Sci & Engn Dept, Storrs, CT 06269 USA
[2] Umm Al Qura Univ, Comp Engn Dept, Mecca, Saudi Arabia
关键词
AES; Higher-order masking; normal basis; SIMD; Intel's SSSE3; Countermeasure;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a new efficient technique to speed up the higher-order masking scheme of the advanced encryption standard (AES). The efficiency of the proposed technique is based on using normal basis in the square operation, using Karnaugh map to lower the required extensive calculations, and using single instruction multiple data (SIMD) technology to perform parallel processing at data level. A Linux machine with an Intel processor that supports SSSE3 instructions is used to evaluate this technique. The technique reduces the encryption cycles by 32% over the second order and 27.1% over the third order masking scheme reported in the literature. We achieved much more practical and attractive results than the reported in the literature.
引用
收藏
页码:293 / 298
页数:6
相关论文
共 50 条
  • [31] Constant-time higher-order Boolean-to-arithmetic masking
    Hutter, Michael
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 173 - 184
  • [32] Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes
    De Santis, Fabrizio
    Bauer, Tobias
    Sigl, Georg
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 17 - 26
  • [33] Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
    Roy, Arnab
    Vivek, Srinivas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 417 - 434
  • [34] Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes
    Tang Ming
    Li Yanbin
    Zhao Dongyan
    Li Yuguang
    Yan Fei
    Zhang Huanguo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (12) : 3008 - 3019
  • [35] Constant-time higher-order Boolean-to-arithmetic masking
    Michael Hutter
    Michael Tunstall
    Journal of Cryptographic Engineering, 2019, 9 : 173 - 184
  • [36] maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
    Barthe, Gilles
    Belaid, Sonia
    Cassiers, Gaetan
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Standaert, Francois-Xavier
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 300 - 318
  • [37] Higher-order expansions of powered extremes of normal samples
    Zhou, Wei
    Ling, Chengxiu
    STATISTICS & PROBABILITY LETTERS, 2016, 111 : 12 - 17
  • [38] A Formalization of the Smith Normal Form in Higher-Order Logic
    Divason, Jose
    Thiemann, Rene
    JOURNAL OF AUTOMATED REASONING, 2022, 66 (04) : 1065 - 1095
  • [39] INFINITESIMAL BENDINGS WITH SLIDING OF HIGHER-ORDER OF ROTATIONAL SURFACES WITH SING-ARBITRARY CURVATURE
    IVANOVAKARATOPRAKLIEVA, I
    DOKLADI NA BOLGARSKATA AKADEMIYA NA NAUKITE, 1992, 45 (05): : 23 - 26
  • [40] Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks
    Guo, Zhipeng
    Tang, Ming
    Prouff, Emmanuel
    Luo, Maixing
    Yan, Fei
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (01) : 34 - 44