Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables

Full metadata record
DC Field Value Language
dc.contributor.authorKim, HanBit-
dc.contributor.authorKim, HeeSeok-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-08-31T05:18:24Z-
dc.date.available2021-08-31T05:18:24Z-
dc.date.created2021-06-18-
dc.date.issued2020-04-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/56866-
dc.description.abstractWith the increasing number of side-channel attacks, countermeasure designers continue to develop various implementations to address such threats. Power-balancing (PB) methods hold the number of 1s and/or transitions (i.e., Hamming weight/distance) of internal processes constant to ensure side-channel safety in an environment in which it is difficult to use random numbers. Most existing studies employed look-up tables (LUTs) to compute those operations, except for XOR and NOT operations. However, LUT-based schemes exhibit some side-channel issues in the address bits of LUTs. In this paper, we propose the application of AND and ADD operations to PB methods based on a rule that encodes 8-bit data into a 32-bit codeword without using LUTs. Unlike previous studies that employed LUTs, our proposals overcome side-channel vulnerabilities associated with the address bits and memory wastage. In addition, we evaluate the side-channel security ensured by the proposed method in comparison with that ensured by other methods. Finally, we apply our methods to SIMON/SPECK ciphers and analyze their performance by comparing them with older schemes.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.titlePower-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, HeeSeok-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.3390/app10072454-
dc.identifier.scopusid2-s2.0-85083312788-
dc.identifier.wosid000533356200253-
dc.identifier.bibliographicCitationAPPLIED SCIENCES-BASEL, v.10, no.7-
dc.relation.isPartOfAPPLIED SCIENCES-BASEL-
dc.citation.titleAPPLIED SCIENCES-BASEL-
dc.citation.volume10-
dc.citation.number7-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordAuthorside-channel attacks-
dc.subject.keywordAuthorcountermeasures-
dc.subject.keywordAuthorARX block ciphers-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE