用户名: 密码: 验证码:
Inner Product Masking Revisited
详细信息    查看全文
  • 作者:Josep Balasch (15)
    Sebastian Faust (16) (17)
    Benedikt Gierlichs (15)

    15. KU Leuven Department Electrical Engineering-ESAT/COSIC and iMinds
    ; Kasteelpark Arenberg 10 ; B-3001 ; Leuven-Heverlee ; Belgium
    16. EPFL Lausanne
    ; Lausanne ; Switzerland
    17. Switzerland and Ruhr-University Bochum
    ; Bochum ; Germany
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2015
  • 出版时间:2015
  • 年:2015
  • 卷:9056
  • 期:1
  • 页码:486-510
  • 全文大小:443 KB
  • 参考文献:1. Balasch, J, Faust, S, Gierlichs, B, Verbauwhede, I Theory and Practice of a Leakage Resilient Masking Scheme. In: Wang, X, Sako, K eds. (2012) Advances in Cryptology 鈥?ASIACRYPT 2012. Springer, Heidelberg, pp. 758-775 CrossRef
    2. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: Simon, J. (ed.) Symposium on Theory of Computing, STOC 1988, pp. 1鈥?0. ACM (1988)
    3. Bilgin, B, Gierlichs, B, Nikova, S, Nikov, V, Rijmen, V Higher-Order Threshold Implementations. In: Sarkar, P, Iwata, T eds. (2014) Advances in Cryptology 鈥?ASIACRYPT 2014. Springer, Heidelberg, pp. 326-343 CrossRef
    4. Carlet, C, Goubin, L, Prouff, E, Quisquater, M, Rivain, M Higher-Order Masking Schemes for S-Boxes. In: Canteaut, A eds. (2012) Fast Software Encryption. Springer, Heidelberg, pp. 366-384 CrossRef
    5. Chari, S, Jutla, CS, Rao, JR, Rohatgi, P Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M eds. (1999) Advances in Cryptology - CRYPTO 鈥?9. Springer, Heidelberg, pp. 398-412 CrossRef
    6. Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko莽, 脟.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13鈥?8. Springer, Heidelberg (2002)
    7. Coron, J-S Higher Order Masking of Look-Up Tables. In: Nguyen, PQ, Oswald, E eds. (2014) Advances in Cryptology 鈥?EUROCRYPT 2014. Springer, Heidelberg, pp. 441-458 CrossRef
    8. Coron, J-S, Prouff, E, Roche, T On the Use of Shamir鈥檚 Secret Sharing against Side-Channel Analysis. In: Mangard, S eds. (2013) Smart Card Research and Advanced Applications. Springer, Heidelberg, pp. 77-90 CrossRef
    9. Coron, J-S, Prouff, E, Rivain, M, Roche, T Higher-Order Side Channel Security and Mask Refreshing. In: Moriai, S eds. (2014) Fast Software Encryption. Springer, Heidelberg, pp. 410-424 CrossRef
    10. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer (2002)
    11. Duc, A, Dziembowski, S, Faust, S Unifying Leakage Models: From Probing Attacks to Noisy Leakage.. In: Nguyen, PQ, Oswald, E eds. (2014) Advances in Cryptology 鈥?EUROCRYPT 2014. Springer, Heidelberg, pp. 423-440 CrossRef
    12. Dziembowski, S, Faust, S Leakage-Resilient Circuits without Computational Assumptions. In: Cramer, R eds. (2012) Theory of Cryptography. Springer, Heidelberg, pp. 230-247 CrossRef
    13. Faust, S, Pietrzak, K, Schipper, J Practical Leakage-Resilient Symmetric Cryptography. In: Prouff, E, Schaumont, P eds. (2012) Cryptographic Hardware and Embedded Systems 鈥?CHES 2012. Springer, Heidelberg, pp. 213-232 CrossRef
    14. Franklin, M.K., Yung, M.: Communication complexity of secure computation (extended abstract). In: Kosaraju, S.R., Fellows, M., Wigderson, A., Ellis, J.A. (eds.) Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992, Victoria, British Columbia, Canada, May 4鈥?, pp. 699鈥?10. ACM (1992)
    15. Fumaroli, G, Martinelli, A, Prouff, E, Rivain, M Affine Masking against Higher-Order Side Channel Analysis. In: Biryukov, A, Gong, G, Stinson, DR eds. (2011) Selected Areas in Cryptography. Springer, Heidelberg, pp. 262-280 CrossRef
    16. Gandolfi, K, Mourtel, C, Olivier, F Electromagnetic Analysis: Concrete Results. In: Ko莽, 脟K, Naccache, D, Paar, C eds. (2001) Cryptographic Hardware and Embedded Systems - CHES 2001. Springer, Heidelberg, pp. 251-261 CrossRef
    17. Genelle, L, Prouff, E, Quisquater, M Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. In: Preneel, B, Takagi, T eds. (2011) Cryptographic Hardware and Embedded Systems 鈥?CHES 2011. Springer, Heidelberg, pp. 240-255 CrossRef
    18. Goubin, L, Martinelli, A Protecting AES with Shamir鈥檚 Secret Sharing Scheme. In: Preneel, B, Takagi, T eds. (2011) Cryptographic Hardware and Embedded Systems 鈥?CHES 2011. Springer, Heidelberg, pp. 79-94 CrossRef
    19. Goubin, L, Patarin, J DES and Differential Power Analysis. In: Ko莽, 脟K, Paar, C eds. (1999) Cryptographic Hardware and Embedded Systems. Springer, Heidelberg, pp. 158-172 CrossRef
    20. Grosso, V, Standaert, F, Faust, S (2014) Masking vs. multiparty computation: how large is the gap for AES? J. Cryptographic. Engineering 4: pp. 47-57
    21. Ishai, Y, Sahai, A, Wagner, D Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D eds. (2003) Advances in Cryptology - CRYPTO 2003. Springer, Heidelberg, pp. 463-481 CrossRef
    22. Kocher, PC Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N eds. (1996) Advances in Cryptology - CRYPTO 鈥?6. Springer, Heidelberg, pp. 104-113
    23. Kocher, PC, Jaffe, J, Jun, B Differential Power Analysis. In: Wiener, M eds. (1999) Advances in Cryptology - CRYPTO 鈥?9. Springer, Heidelberg, pp. 388-397 CrossRef
    24. Mangard, S, Popp, T, Gammel, BM Side-Channel Leakage of Masked CMOS Gates. In: Menezes, A eds. (2005) Topics in Cryptology 鈥?CT-RSA 2005. Springer, Heidelberg, pp. 351-365 CrossRef
    25. Moradi, A, Mischke, O On the Simplicity of Converting Leakages from Multivariate to Univariate. In: Bertoni, G, Coron, J-S eds. (2013) Cryptographic Hardware and Embedded Systems - CHES 2013. Springer, Heidelberg, pp. 1-20 CrossRef
    26. Nikova, S, Rijmen, V, Schl盲ffer, M (2011) Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptology 24: pp. 292-321 CrossRef
    27. Prouff, E, Rivain, M Masking against Side-Channel Attacks: A Formal Security Proof. In: Johansson, T, Nguyen, PQ eds. (2013) Advances in Cryptology 鈥?EUROCRYPT 2013. Springer, Heidelberg, pp. 142-159 CrossRef
    28. Prouff, E, Rivain, M, Roche, T On the Practical Security of a Leakage Resilient Masking Scheme. In: Benaloh, J eds. (2014) Topics in Cryptology 鈥?CT-RSA 2014. Springer, Heidelberg, pp. 169-182 CrossRef
    29. Prouff, E, Roche, T Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols. In: Preneel, B, Takagi, T eds. (2011) Cryptographic Hardware and Embedded Systems 鈥?CHES 2011. Springer, Heidelberg, pp. 63-78 CrossRef
    30. Quisquater, J-J, Samyde, D ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali, S, Jensen, T eds. (2001) Smart Card Programming and Security. Springer, Heidelberg, pp. 200-210 CrossRef
    31. Rao, A.: An Exposition of Bourgain鈥檚 2-Source Extractor. Electronic Colloquium on Computational Complexity- ECCC 14(034) (2007)
    32. Reparaz, O, Gierlichs, B, Verbauwhede, I Selecting Time Samples for Multivariate DPA Attacks. In: Prouff, E, Schaumont, P eds. (2012) Cryptographic Hardware and Embedded Systems 鈥?CHES 2012. Springer, Heidelberg, pp. 155-174 CrossRef
    33. Rivain, M, Prouff, E Provably Secure Higher-Order Masking of AES. In: Mangard, S, Standaert, F-X eds. (2010) Cryptographic Hardware and Embedded Systems, CHES 2010. Springer, Heidelberg, pp. 413-427 CrossRef
    34. Shamir, A (1979) How to Share a Secret. Communications of the ACM 22: pp. 612-613 CrossRef
    35. Standaert, F-X, Malkin, TG, Yung, M A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A eds. (2009) Advances in Cryptology - EUROCRYPT 2009. Springer, Heidelberg, pp. 443-461 CrossRef
    36. Standaert, F-X, Veyrat-Charvillon, N, Oswald, E, Gierlichs, B, Medwed, M, Kasper, M, Mangard, S The World Is Not Enough: Another Look on Second-Order DPA. In: Abe, M eds. (2010) Advances in Cryptology - ASIACRYPT 2010. Springer, Heidelberg, pp. 112-129 CrossRef
    37. Willich, M A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. In: Honary, B eds. (2001) Cryptography and Coding. Springer, Heidelberg, pp. 44-62 CrossRef
    38. Win, E.D., Bosselaers, A., Vandenberghe, S., Gersem, P.D., Vandewalle, J.: A Fast Software Implementation for Arithmetic Operations inGF(2 \(^n\) ). In: Kim, K., Matsumoto, T., (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 65鈥?6. Springer, Heidelberg (1996)
    39. Yu, Y., Standaert, F., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) Computer and Communications Security, CCS 2010, pp. 141鈥?51. ACM (2010)
  • 作者单位:Advances in Cryptology -- EUROCRYPT 2015
  • 丛书名:978-3-662-46799-2
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
Masking is a popular countermeasure against side channel attacks. Many practical works use Boolean masking because of its simplicity, ease of implementation and comparably low performance overhead. Some recent works have explored masking schemes with higher algebraic complexity and have shown that they provide more security than Boolean masking at the cost of higher overheads. In particular, masking based on the inner product was shown to be practical, albeit not efficient, for a small security parameter, and at the same time provable secure in the domain of leakage resilient cryptography for a large security parameter. In this work we explore a security versus efficiency tradeoff and provide an improved and tweaked inner product masking. Our practical security evaluation shows that it is less secure than the original inner product masking but more secure than Boolean masking. Our performance evaluation shows that our scheme is only four times slower than Boolean masking and more than two times faster than the original inner product masking. Besides the practical security analysis we prove the security of our scheme and its masked operations in the threshold probing model.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700