Mitigating the Side Channel Power Analysis Attacks using New Variable Mapping Substitution Technique
Hytham M. Hussein1, Abd Elhamed Gaafer2, Ahmed A. Abdel-Hafez3, Eman H. Beshr4
1Hytham M. Hussein, Electrical and Control Eng. Dept. Arab Academy for Science & Technology, Cairo, Egypt.
2Abd Elhamed Gaafer, Electronics and Communication Dept. Arab Academy for Science and Technology, Cairo, Egypt.
3Ahmed A. Abdel-Hafez, Communication Dept. Military Technical Collage Cairo, Egypt.
4Eman H. Beshr, Electrical and Control Eng. Dept. Arab Academy for Science & Technology, Cairo, Egypt. 

Manuscript received on November 11, 2019. | Revised Manuscript received on November 20 2019. | Manuscript published on 30 November, 2019. | PP: 10863-10868 | Volume-8 Issue-4, November 2019. | Retrieval Number: D4389118419/2019©BEIESP | DOI: 10.35940/ijrte.D4389.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Side-channel attack has been a real threat against many cryptographic embedded systems. In this attack, the internal data is retrieved directly by analyzing the power magnitude according to the fact that there is a considerable difference in power when manipulating 0’s and 1’s. A commonly used algorithmic countermeasures incur large execution delay and resources overheads. In this paper, a novel technique using Variable Mapping Substitution (VMS) is proposed for mitigating side channel power analysis attack against Advanced Encryption Standard (AES). VMS-AES is a novel AES-like algorithm which uses Linear Feedback Shift Register (LFSR) to generate the required parameters used to remap the values of substitution box (S-box) randomly to another location depending on a secret key. This remapping also keeps the same good linear and differential properties of the AES S-box. VMS-AES algorithm can be easily deployed in most embedded applications because no architectural change is needed and only software modifications are performed. In our proposal, chipwisperer side channel attack analysis tool is used to verify the effectiveness of the proposed algorithm. Also VMS-AES with different number of rounds is evaluated using three methods: NIST statistical suite tests, correlation coefficient analysis, and cryptographic parameters evaluation to study the effects of this change upon the AES security.
Keywords: Side-Channel Attack, S-box, Permutation, Variable Mapping Substitution.
Scope of the Article: Software Engineering Techniques and Production Perspectives.