Masking with Randomized Look Up Tables

作者: François-Xavier Standaert , Christophe Petit , Nicolas Veyrat-Charvillon

DOI: 10.1007/978-3-642-28368-0_19

关键词:

摘要: We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show that this prevents side-channel attacks of all orders during execution protected cipher implementation, given some secure precomputations can be performed. Second, taking advantage linear diffusion layer modern allows deriving clear arguments for security their implementations, easily interpreted by hardware designers. Masking with randomized look up tables fast times but its memory requirements are high and, depending on protect, prohibitive. believe proposal brings an interesting connection former countermeasures against recent formal solutions cope physical leakage. It illustrates vs. performance tradeoff these complementary approaches as result, highlights simple design guidelines leakage resilient ciphers.

参考文章(61)
Julien Iguchi-Cartigny, Jean-Louis Lanet, Dieter Gollmann, Smart Card Research and Advanced Application ,(2011)
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Brecht Wyseur, White-Box Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.). pp. 1386- 1387 ,(2011)
Elisabeth Oswald, Kai Schramm, An efficient masking scheme for AES software implementations workshop on information security applications. pp. 292- 305 ,(2005) , 10.1007/11604938_23
Thomas S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software cryptographic hardware and embedded systems. pp. 238- 251 ,(2000) , 10.1007/3-540-44499-8_19
Stanley Chow, Philip Eisen, Harold Johnson, Paul C. Van Oorschot, White-Box Cryptography and an AES Implementation selected areas in cryptography. pp. 250- 270 ,(2002) , 10.1007/3-540-36492-7_17
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen, A side-channel analysis resistant description of the AES s-box fast software encryption. pp. 413- 423 ,(2005) , 10.1007/11502760_28
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater, SEA: A Scalable Encryption Algorithm for Small Embedded Applications Smart Card Research and Advanced Applications. ,vol. 3928, pp. 222- 236 ,(2006) , 10.1007/11733447_16
Mehdi-Laurent Akkar, Christophe Giraud, An Implementation of DES and AES, Secure against Some Attacks cryptographic hardware and embedded systems. pp. 309- 318 ,(2001) , 10.1007/3-540-44709-1_26