Mitigating the Side Channel Power Analysis Attacks using New Variable Mapping Substitution Technique

Side-channel attack has been a real threat against many cryptographic embedded systems. In this attack, the internal data is retrieved directly by analyzing the power magnitude according to the fact that there is a considerable difference in power when manipulating 0’s and 1’s. A commonly used algor...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of recent technology and engineering 2019-11, Vol.8 (4), p.10863-10868
Hauptverfasser: Hussein, Hytham M., Gaafer, Abd Elhamed, Abdel-Hafez, Ahmed A., Beshr, Eman H.
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10868
container_issue 4
container_start_page 10863
container_title International journal of recent technology and engineering
container_volume 8
creator Hussein, Hytham M.
Gaafer, Abd Elhamed
Abdel-Hafez, Ahmed A.
Beshr, Eman H.
description Side-channel attack has been a real threat against many cryptographic embedded systems. In this attack, the internal data is retrieved directly by analyzing the power magnitude according to the fact that there is a considerable difference in power when manipulating 0’s and 1’s. A commonly used algorithmic countermeasures incur large execution delay and resources overheads. In this paper, a novel technique using Variable Mapping Substitution (VMS) is proposed for mitigating side channel power analysis attack against Advanced Encryption Standard (AES). VMS-AES is a novel AES-like algorithm which uses Linear Feedback Shift Register (LFSR) to generate the required parameters used to remap the values of substitution box (S-box) randomly to another location depending on a secret key. This remapping also keeps the same good linear and differential properties of the AES S-box. VMS-AES algorithm can be easily deployed in most embedded applications because no architectural change is needed and only software modifications are performed. In our proposal, chipwisperer side channel attack analysis tool is used to verify the effectiveness of the proposed algorithm. Also VMS-AES with different number of rounds is evaluated using three methods: NIST statistical suite tests, correlation coefficient analysis, and cryptographic parameters evaluation to study the effects of this change upon the AES security
doi_str_mv 10.35940/ijrte.D4389.118419
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_35940_ijrte_D4389_118419</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_35940_ijrte_D4389_118419</sourcerecordid><originalsourceid>FETCH-LOGICAL-c899-79ddaba808e8a252a330dcbc01a9a1e5dbc7c017fbba4d69329a805bc25c0a093</originalsourceid><addsrcrecordid>eNpNkMtOAjEYhRujiQR5Ajd9gcF2Opd2SfCagJowcTv52_5AcZzBthPC23Nz4epccnIWHyH3nI1FrjL24DY-4vgxE1KNOZcZV1dkkKZlmQhZyut__paMQtgwxrgoeCaKAbFzF90KomtXNK6RLpxFOl1D22JDP7sdejppodkHF-gkRjDfgfbhtH7HHf0C70A3SOew3Z7KRa9DdLGPrmtphWbdut8e78jNEpqAoz8dkur5qZq-JrOPl7fpZJYYqVRSKmtBg2QSJaR5CkIwa7RhHBRwzK025TGUS60hs4USqTqOc23S3DBgSgyJuNwa34XgcVlvvfsBv685q8-o6jOq-oyqvqASB8UqYAY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Mitigating the Side Channel Power Analysis Attacks using New Variable Mapping Substitution Technique</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Hussein, Hytham M. ; Gaafer, Abd Elhamed ; Abdel-Hafez, Ahmed A. ; Beshr, Eman H.</creator><creatorcontrib>Hussein, Hytham M. ; Gaafer, Abd Elhamed ; Abdel-Hafez, Ahmed A. ; Beshr, Eman H. ; Communication Dept. Military Technical Collage Cairo, Egypt ; Electrical and Control Eng. Dept. Arab Academy for Science &amp; Technology, Cairo, Egypt ; Electronics and Communication Dept. Arab Academy for Science and Technology, Cairo, Egypt</creatorcontrib><description>Side-channel attack has been a real threat against many cryptographic embedded systems. In this attack, the internal data is retrieved directly by analyzing the power magnitude according to the fact that there is a considerable difference in power when manipulating 0’s and 1’s. A commonly used algorithmic countermeasures incur large execution delay and resources overheads. In this paper, a novel technique using Variable Mapping Substitution (VMS) is proposed for mitigating side channel power analysis attack against Advanced Encryption Standard (AES). VMS-AES is a novel AES-like algorithm which uses Linear Feedback Shift Register (LFSR) to generate the required parameters used to remap the values of substitution box (S-box) randomly to another location depending on a secret key. This remapping also keeps the same good linear and differential properties of the AES S-box. VMS-AES algorithm can be easily deployed in most embedded applications because no architectural change is needed and only software modifications are performed. In our proposal, chipwisperer side channel attack analysis tool is used to verify the effectiveness of the proposed algorithm. Also VMS-AES with different number of rounds is evaluated using three methods: NIST statistical suite tests, correlation coefficient analysis, and cryptographic parameters evaluation to study the effects of this change upon the AES security</description><identifier>ISSN: 2277-3878</identifier><identifier>EISSN: 2277-3878</identifier><identifier>DOI: 10.35940/ijrte.D4389.118419</identifier><language>eng</language><ispartof>International journal of recent technology and engineering, 2019-11, Vol.8 (4), p.10863-10868</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Hussein, Hytham M.</creatorcontrib><creatorcontrib>Gaafer, Abd Elhamed</creatorcontrib><creatorcontrib>Abdel-Hafez, Ahmed A.</creatorcontrib><creatorcontrib>Beshr, Eman H.</creatorcontrib><creatorcontrib>Communication Dept. Military Technical Collage Cairo, Egypt</creatorcontrib><creatorcontrib>Electrical and Control Eng. Dept. Arab Academy for Science &amp; Technology, Cairo, Egypt</creatorcontrib><creatorcontrib>Electronics and Communication Dept. Arab Academy for Science and Technology, Cairo, Egypt</creatorcontrib><title>Mitigating the Side Channel Power Analysis Attacks using New Variable Mapping Substitution Technique</title><title>International journal of recent technology and engineering</title><description>Side-channel attack has been a real threat against many cryptographic embedded systems. In this attack, the internal data is retrieved directly by analyzing the power magnitude according to the fact that there is a considerable difference in power when manipulating 0’s and 1’s. A commonly used algorithmic countermeasures incur large execution delay and resources overheads. In this paper, a novel technique using Variable Mapping Substitution (VMS) is proposed for mitigating side channel power analysis attack against Advanced Encryption Standard (AES). VMS-AES is a novel AES-like algorithm which uses Linear Feedback Shift Register (LFSR) to generate the required parameters used to remap the values of substitution box (S-box) randomly to another location depending on a secret key. This remapping also keeps the same good linear and differential properties of the AES S-box. VMS-AES algorithm can be easily deployed in most embedded applications because no architectural change is needed and only software modifications are performed. In our proposal, chipwisperer side channel attack analysis tool is used to verify the effectiveness of the proposed algorithm. Also VMS-AES with different number of rounds is evaluated using three methods: NIST statistical suite tests, correlation coefficient analysis, and cryptographic parameters evaluation to study the effects of this change upon the AES security</description><issn>2277-3878</issn><issn>2277-3878</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNpNkMtOAjEYhRujiQR5Ajd9gcF2Opd2SfCagJowcTv52_5AcZzBthPC23Nz4epccnIWHyH3nI1FrjL24DY-4vgxE1KNOZcZV1dkkKZlmQhZyut__paMQtgwxrgoeCaKAbFzF90KomtXNK6RLpxFOl1D22JDP7sdejppodkHF-gkRjDfgfbhtH7HHf0C70A3SOew3Z7KRa9DdLGPrmtphWbdut8e78jNEpqAoz8dkur5qZq-JrOPl7fpZJYYqVRSKmtBg2QSJaR5CkIwa7RhHBRwzK025TGUS60hs4USqTqOc23S3DBgSgyJuNwa34XgcVlvvfsBv685q8-o6jOq-oyqvqASB8UqYAY</recordid><startdate>20191130</startdate><enddate>20191130</enddate><creator>Hussein, Hytham M.</creator><creator>Gaafer, Abd Elhamed</creator><creator>Abdel-Hafez, Ahmed A.</creator><creator>Beshr, Eman H.</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20191130</creationdate><title>Mitigating the Side Channel Power Analysis Attacks using New Variable Mapping Substitution Technique</title><author>Hussein, Hytham M. ; Gaafer, Abd Elhamed ; Abdel-Hafez, Ahmed A. ; Beshr, Eman H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c899-79ddaba808e8a252a330dcbc01a9a1e5dbc7c017fbba4d69329a805bc25c0a093</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Hussein, Hytham M.</creatorcontrib><creatorcontrib>Gaafer, Abd Elhamed</creatorcontrib><creatorcontrib>Abdel-Hafez, Ahmed A.</creatorcontrib><creatorcontrib>Beshr, Eman H.</creatorcontrib><creatorcontrib>Communication Dept. Military Technical Collage Cairo, Egypt</creatorcontrib><creatorcontrib>Electrical and Control Eng. Dept. Arab Academy for Science &amp; Technology, Cairo, Egypt</creatorcontrib><creatorcontrib>Electronics and Communication Dept. Arab Academy for Science and Technology, Cairo, Egypt</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of recent technology and engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hussein, Hytham M.</au><au>Gaafer, Abd Elhamed</au><au>Abdel-Hafez, Ahmed A.</au><au>Beshr, Eman H.</au><aucorp>Communication Dept. Military Technical Collage Cairo, Egypt</aucorp><aucorp>Electrical and Control Eng. Dept. Arab Academy for Science &amp; Technology, Cairo, Egypt</aucorp><aucorp>Electronics and Communication Dept. Arab Academy for Science and Technology, Cairo, Egypt</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mitigating the Side Channel Power Analysis Attacks using New Variable Mapping Substitution Technique</atitle><jtitle>International journal of recent technology and engineering</jtitle><date>2019-11-30</date><risdate>2019</risdate><volume>8</volume><issue>4</issue><spage>10863</spage><epage>10868</epage><pages>10863-10868</pages><issn>2277-3878</issn><eissn>2277-3878</eissn><abstract>Side-channel attack has been a real threat against many cryptographic embedded systems. In this attack, the internal data is retrieved directly by analyzing the power magnitude according to the fact that there is a considerable difference in power when manipulating 0’s and 1’s. A commonly used algorithmic countermeasures incur large execution delay and resources overheads. In this paper, a novel technique using Variable Mapping Substitution (VMS) is proposed for mitigating side channel power analysis attack against Advanced Encryption Standard (AES). VMS-AES is a novel AES-like algorithm which uses Linear Feedback Shift Register (LFSR) to generate the required parameters used to remap the values of substitution box (S-box) randomly to another location depending on a secret key. This remapping also keeps the same good linear and differential properties of the AES S-box. VMS-AES algorithm can be easily deployed in most embedded applications because no architectural change is needed and only software modifications are performed. In our proposal, chipwisperer side channel attack analysis tool is used to verify the effectiveness of the proposed algorithm. Also VMS-AES with different number of rounds is evaluated using three methods: NIST statistical suite tests, correlation coefficient analysis, and cryptographic parameters evaluation to study the effects of this change upon the AES security</abstract><doi>10.35940/ijrte.D4389.118419</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2277-3878
ispartof International journal of recent technology and engineering, 2019-11, Vol.8 (4), p.10863-10868
issn 2277-3878
2277-3878
language eng
recordid cdi_crossref_primary_10_35940_ijrte_D4389_118419
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
title Mitigating the Side Channel Power Analysis Attacks using New Variable Mapping Substitution Technique
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T05%3A28%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mitigating%20the%20Side%20Channel%20Power%20Analysis%20Attacks%20using%20New%20Variable%20Mapping%20Substitution%20Technique&rft.jtitle=International%20journal%20of%20recent%20technology%20and%20engineering&rft.au=Hussein,%20Hytham%20M.&rft.aucorp=Communication%20Dept.%20Military%20Technical%20Collage%20Cairo,%20Egypt&rft.date=2019-11-30&rft.volume=8&rft.issue=4&rft.spage=10863&rft.epage=10868&rft.pages=10863-10868&rft.issn=2277-3878&rft.eissn=2277-3878&rft_id=info:doi/10.35940/ijrte.D4389.118419&rft_dat=%3Ccrossref%3E10_35940_ijrte_D4389_118419%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true