Secure Conversion between Boolean and Arithmetic Masking of Any Order

作者: Jean-Sébastien Coron , Johann Großschädl , Praveen Kumar Vadnala

DOI: 10.1007/978-3-662-44709-3_11

关键词: Masking (Electronic Health Record)CryptographyTime complexityAlgorithmBoolean operations in computer-aided designComputer scienceArithmeticElectronic circuitMicrocontroller

摘要: An effective countermeasure against side-channel attacks is to mask all sensitive intermediate variables with one or more random values. When a cryptographic algorithm involves both arithmetic and Boolean operations, it necessary convert from masking vice versa. At CHES 2001, Goubin introduced two algorithms for secure conversion between masks, but his approach can only be applied first-order masking. In this paper, we present evaluate new that are of any order. To masks size ki¾?bits securely order n, the proposed have time complexity $\mathcal{O}n^2 k$ in directions proven Ishai, Sahai, Wagner ISW framework private circuits. We our using HMAC-SHA-1 as example report execution times achieved on 32-bit AVR microcontroller.

参考文章(33)
Mohamed Karroumi, Benjamin Richard, Marc Joye, Addition with Blinded Operands international workshop constructive side-channel analysis and secure design. pp. 41- 55 ,(2014) , 10.1007/978-3-319-10175-0_4
Silvio Micali, Leonid Reyzin, Physically observable cryptography theory of cryptography conference. pp. 278- 296 ,(2004) , 10.1007/978-3-540-24638-1_16
Karine Gandolfi, Christophe Mourtel, Francis Olivier, Electromagnetic Analysis: Concrete Results cryptographic hardware and embedded systems. ,vol. 2162, pp. 251- 261 ,(2001) , 10.1007/3-540-44709-1_21
Giovanni Di Crescenzo, Richard Lipton, Shabsi Walfish, Perfectly Secure Password Protocols in the Bounded Retrieval Model Theory of Cryptography. pp. 225- 244 ,(2006) , 10.1007/11681878_12
Louis Goubin, Jacques Patarin, DES and Differential Power Analysis (The Duplication Method) cryptographic hardware and embedded systems. pp. 158- 172 ,(1999) , 10.1007/3-540-48059-5_15
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff, Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis fast software encryption. pp. 127- 143 ,(2008) , 10.1007/978-3-540-71039-4_8
Yuval Ishai, Amit Sahai, David Wagner, Private Circuits: Securing Hardware against Probing Attacks Advances in Cryptology - CRYPTO 2003. pp. 463- 481 ,(2003) , 10.1007/978-3-540-45146-4_27
Stefan Dziembowski, Intrusion-Resilience Via the Bounded-Storage Model Theory of Cryptography. pp. 207- 224 ,(2006) , 10.1007/11681878_11
Xuejia Lai, James L. Massey, A proposal for a new block encryption standard theory and application of cryptographic techniques. pp. 389- 404 ,(1991) , 10.1007/3-540-46877-3_35
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9