Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box (CROSBI ID 608266)

Prilog sa skupa u zborniku | izvorni znanstveni rad | međunarodna recenzija

Picek, Stjepan ; Ege, Baris ; Batina, Lejla ; Jakobović, Domagoj ; Chmielewski, Lukasz ; Golub, Marin On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box // Proceedings of the First Workshop on Cryptography and Security in Computing Systems. The Association for Computing Machinery (ACM), 2014. str. 13-18

Podaci o odgovornosti

Picek, Stjepan ; Ege, Baris ; Batina, Lejla ; Jakobović, Domagoj ; Chmielewski, Lukasz ; Golub, Marin

engleski

On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box

Finding balanced S-boxes with high nonlinearity and low transparency order is a difficult problem. The property of transparency order is important since it specifies the resilience of an S-box against differential power analysis. Better values for transparency order and hence improved side-channel security often imply less in terms of nonlinearity. Therefore, it is impossible to find an S-box with all optimal values. Currently, there are no algebraic procedures that can give the preferred and complete set of properties for an S-box. In this paper, we employ evolutionary algorithms to find S-boxes with desired cryptographic properties. Specifically, we conduct experiments for the 8×8 S-box case as used in the AES standard. The results of our experiments proved the feasibility of finding S-boxes with the desired properties in the case of AES. In addition, we show preliminary results of side-channel experiments on different versions of "improved" S-boxes.

S-box ; block ciphers ; genetic algorithms ; side-channel analysis ; transparency order

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o prilogu

13-18.

2014.

nije evidentirano

objavljeno

978-1-4503-2484-7

Podaci o matičnoj publikaciji

Proceedings of the First Workshop on Cryptography and Security in Computing Systems

The Association for Computing Machinery (ACM)

Podaci o skupu

First Workshop on Cryptography and Security in Computing Systems

predavanje

20.01.2014-21.01.2014

Austrija

Povezanost rada

Računarstvo