Protecting Triple-DES Against DPA A Practical Application of Domain-Oriented Masking

被引:1
|
作者
Sasdrich, Pascal [1 ,2 ]
Hutter, Michael [1 ]
机构
[1] Cryptog Res, 425 Market St,11th Floor, San Francisco, CA 94105 USA
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
THRESHOLD IMPLEMENTATIONS;
D O I
10.1007/978-3-319-89641-0_12
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although AES has become the predominant standard for symmetric block ciphers, T-DES is still widely used especially for electronic payment and financial solutions. In order to protect small and embedded devices against power analysis and side-channel attacks in general, appropriate countermeasures have to be considered. In this paper, we present the first practical application of the Domain-Oriented Masking (DOM) scheme for the T-DES cipher in hardware and provide practical evaluation results that confirm the security of DOM and our designs. In particular, using Test Vector Leakage Assessment (TVLA) as evaluation methodology confirms that our first- and second-order secure architectures do not exhibit detectable leakage using up to 2 billion traces. This is the first paper that presents a T-DES hardware implementation using a state of the art provable secure masking technique.
引用
收藏
页码:207 / 226
页数:20
相关论文
共 9 条
  • [1] FPGA implementations of the DES and triple-DES masked against power analysis attacks
    Standaert, F. -X.
    Rouvroy, G.
    Quisquater, J. -J.
    [J]. 2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 791 - 794
  • [2] CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
    Jahanbani, Mohsen
    Bagheri, Nasour
    Norouzi, Zeinolabedin
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 67 - 80
  • [3] Domain-Oriented Masking Compact Masked Hardware Implementations with Arbitrary Protection Order
    Gross, Hannes
    Mangard, Stefan
    Korak, Thomas
    [J]. PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 3 - 3
  • [4] Domain-oriented Language Modeling with Adaptive Hybrid Masking and Optimal Transport Alignment
    Zhang, Denghui
    Yuan, Zixuan
    Liu, Yanchi
    Liu, Hao
    Zhuang, Fuzhen
    Xiong, Hui
    Chen, Haifeng
    [J]. KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 2145 - 2153
  • [5] WikiFactory: An ontology-based application for creating domain-oriented wikis
    Di Iorio, Angelo
    Presutti, Valentina
    Vitali, Fabio
    [J]. SEMANTIC WEB: RESEARCH AND APPLICATIONS, PROCEEDINGS, 2006, 4011 : 664 - 678
  • [6] Solving-oriented and domain-oriented knowledge structures: Their application to debugging problem solving activity
    Masmoudi, S
    [J]. CONCEPTUAL STRUCTURES: BROADENING THE BASE, PROCEEDINGS, 2001, 2120 : 58 - 71
  • [7] Domain-oriented library of scheduling methods: design principle and real-life application
    Hori, M
    Yoshida, T
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 1998, 49 (04) : 601 - 626
  • [8] Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks
    Imana, Jose L.
    Dhooghe, Siemen
    [J]. INFORMATION PROCESSING LETTERS, 2023, 182
  • [9] A general framework and guidelines for benchmarking computational intelligence algorithms applied to forecasting problems derived from an application domain-oriented survey
    Oprea, Mihaela
    [J]. APPLIED SOFT COMPUTING, 2020, 89