In the area of hardware security, the exploitation of Side-Channel Analysis (SCA) to attack hardware devices has become a major issue in the last 20 years. The study of effective countermeasures is crucial, as this class of attacks reaches higher rates of effectiveness with respect to classical cryptanalysis. While implementation-level countermeasures are achieving promising results, the academic community has recently focused on solutions that can reduce leakage from the cryptographic mathematical layer, regardless of the underlying hardware/software architecture. In the field of symmetric encryption schemes (such as AES), novel substitution structures have been proposed, claiming an improved side-channel resistance without any additional costs in terms of area, performance or power consumption. To the best of our knowledge, most of these solutions have been studied only from a mathematical point of view, and are still lacking practical experimentation on resource-constrained devices. This paper provides an empirical evaluation of the latest S-Box proposals. The necessary data has been collected in a reference scenario with limited noise effects, targeting an unprotected software implementation of the AES-128 algorithm running on an 8-bit microcontroller. The results indicate that, despite claims of enhanced resistance to Side-Channel Analysis, these new countermeasures do not offer a meaningful improvement over the standard AES implementation and are insufficient to prevent a successful attack. Moreover, when compared to widely known implementation-level countermeasures such as masking and hiding, these novel approaches appear far less promising: established techniques provide substantially stronger protection in practice for implementations capable of supporting them.

Empirical evaluation of the resistance of novel non-algebraic AES s-boxes to power side-channel attacks / Cerini, Samuele Yves; Roascio, Gianluca; Maunero, Nicolò; Prinetto, Paolo. - 4198:(2026). ( ITASEC & SERICS 2026 - Joint National Conference on Cybersecurity 2026 Cagliari, Italy 09-13/2/2026).

Empirical evaluation of the resistance of novel non-algebraic AES s-boxes to power side-channel attacks

Cerini Samuele Yves
;
Maunero Nicolò;
2026

Abstract

In the area of hardware security, the exploitation of Side-Channel Analysis (SCA) to attack hardware devices has become a major issue in the last 20 years. The study of effective countermeasures is crucial, as this class of attacks reaches higher rates of effectiveness with respect to classical cryptanalysis. While implementation-level countermeasures are achieving promising results, the academic community has recently focused on solutions that can reduce leakage from the cryptographic mathematical layer, regardless of the underlying hardware/software architecture. In the field of symmetric encryption schemes (such as AES), novel substitution structures have been proposed, claiming an improved side-channel resistance without any additional costs in terms of area, performance or power consumption. To the best of our knowledge, most of these solutions have been studied only from a mathematical point of view, and are still lacking practical experimentation on resource-constrained devices. This paper provides an empirical evaluation of the latest S-Box proposals. The necessary data has been collected in a reference scenario with limited noise effects, targeting an unprotected software implementation of the AES-128 algorithm running on an 8-bit microcontroller. The results indicate that, despite claims of enhanced resistance to Side-Channel Analysis, these new countermeasures do not offer a meaningful improvement over the standard AES implementation and are insufficient to prevent a successful attack. Moreover, when compared to widely known implementation-level countermeasures such as masking and hiding, these novel approaches appear far less promising: established techniques provide substantially stronger protection in practice for implementations capable of supporting them.
2026
Side-channel analysis, Hardware attacks, Power analysis, S-boxes, AES, Cryptography ,ChipWhisperer
File in questo prodotto:
File Dimensione Formato  
ITASEC_26_Camera_Ready_127.pdf

accesso aperto

Descrizione: Empirical Evaluation of the Resistance of Novel Non-Algebraic AES S-Boxes to Power Side-Channel Attacks
Tipologia: Versione Editoriale (PDF)
Licenza: Creative commons
Dimensione 2.11 MB
Formato Adobe PDF
2.11 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11771/40538
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
social impact