ATTENTION/WARNING - NE PAS DÉPOSER ICI/DO NOT SUBMIT HERE

Ceci est la version de TEST de DIAL.mem. Veuillez ne pas soumettre votre mémoire sur ce site mais bien à l'URL suivante: 'https://thesis.dial.uclouvain.be'.
This is the TEST version of DIAL.mem. Please use the following URL to submit your master thesis: 'https://thesis.dial.uclouvain.be'.
 

Expanding SMAesH : implementing masked AES-256 encryption and decryption on shared 32-bits hardware

(2024)

Files

Bauffe_10441900_2024.pdf
  • Closed access
  • Adobe PDF
  • 493.41 KB

Details

Supervisors
Faculty
Degree label
Abstract
Hardware implementations of AES are subject to side-channel attacks. An efficient counter measure is masking of sensible data. In this work, we use the Hardware Private Circuit (HPC) masking scheme [CGLS21]. This method introduces sequential latency in otherwise combinatorial circuits. The design of masked hardware implementation is not straightforward. With the help of tools and concepts developed in [MCS22, CGM+23, KM22], we improve the masked 32 bits AES-128 implementation introduced in [MCS22]. The ability to decrypt a message is added, and the key size is increased to 256 bits. We evaluate the performance of this AES-256 and compare it to previous iterations. We also ensure it is still secure in the HPC masking scheme and compare two representations of the AES S-box [BP12, Can05].