Protecting AES with Shamir's Secret Sharing Scheme

被引:0
|
作者
Goubin, Louis [1 ]
Martinelli, Ange [1 ]
机构
[1] Versailles St Quentin En Yvelines Univ, Versailles, France
关键词
Side Channel Analysis (SCA); Masking; AES Implementation; Shamir's Secret Sharing; Multi-party computation; HIGHER-ORDER MASKING; POWER ANALYSIS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic algorithms embedded on physical devices are particularly vulnerable to Side Channel Analysis (SCA). The most common countermeasure for block cipher implementations is masking, which randomizes the variables to be protected by combining them with one or several random values. In this paper, we propose an original masking scheme based on Shamir's Secret Sharing scheme [22] as an alternative to Boolean masking. We detail its implementation for the AES using the same tool than Rivain and Prouff in CHES 2010 [16]: multi-party computation. We then conduct a security analysis of our scheme in order to compare it to Boolean masking. Our results show that for a given amount of noise the proposed scheme - implemented to the first order provides the same security level as 3rd up to 4th order boolean masking, together with a better efficiency.
引用
收藏
页码:79 / 94
页数:16
相关论文
共 50 条
  • [1] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [2] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [3] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [4] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [5] A Modified Shamir Secret Sharing Scheme With Efficient Encoding
    Hineman, Allyson
    Blaum, Mario
    [J]. IEEE COMMUNICATIONS LETTERS, 2022, 26 (04) : 758 - 762
  • [6] Sound Steganography using Shamir Secret Sharing Scheme
    Kacamak, Salajdin
    Uka, Arban
    [J]. 2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220
  • [7] A Secret Sharing Scheme Based on AES
    Cui, Jie
    Chen, Lei
    Zhang, Yiming
    Xie, Zhiqiang
    Zhong, Hong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 295 - 302
  • [8] An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 45 - 47
  • [9] Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs
    Nakkar, Mouna
    Altawy, Riham
    Youssef, Amr
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3412 - 3429
  • [10] Security limitations of Shamir's secret sharing
    Lemnouar, Noui
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 977 - 989