Protecting AES with Shamir's Secret Sharing Scheme

被引:0
|
作者
Goubin, Louis [1 ]
Martinelli, Ange [1 ]
机构
[1] Versailles St Quentin En Yvelines Univ, Versailles, France
关键词
Side Channel Analysis (SCA); Masking; AES Implementation; Shamir's Secret Sharing; Multi-party computation; HIGHER-ORDER MASKING; POWER ANALYSIS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic algorithms embedded on physical devices are particularly vulnerable to Side Channel Analysis (SCA). The most common countermeasure for block cipher implementations is masking, which randomizes the variables to be protected by combining them with one or several random values. In this paper, we propose an original masking scheme based on Shamir's Secret Sharing scheme [22] as an alternative to Boolean masking. We detail its implementation for the AES using the same tool than Rivain and Prouff in CHES 2010 [16]: multi-party computation. We then conduct a security analysis of our scheme in order to compare it to Boolean masking. Our results show that for a given amount of noise the proposed scheme - implemented to the first order provides the same security level as 3rd up to 4th order boolean masking, together with a better efficiency.
引用
收藏
页码:79 / 94
页数:16
相关论文
共 50 条
  • [31] Efficient Computation Method of Participants' Weights in Shamir's Secret Sharing
    Li, Long
    Gu, Tianlong
    Chang, Liang
    Li, Jingjing
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 598 - 605
  • [32] 3-D plane based extended Shamir’s secret sharing
    Agarwal A.
    Deshmukh M.
    [J]. International Journal of Information Technology, 2021, 13 (2) : 609 - 612
  • [33] (k,n) halftone visual cryptography based on Shamir's secret sharing
    Ding Haiyang
    Li Zichen
    Bi Wei
    [J]. The Journal of China Universities of Posts and Telecommunications, 2018, (02) : 60 - 76
  • [34] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    [J]. EURASIP Journal on Advances in Signal Processing, 2010
  • [35] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [36] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [37] Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
    Maji, Hemanta K.
    Hai H Nguyen
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 344 - 374
  • [38] Shamir Secret Sharing Scheme with Dynamic Access Structure (SSSDAS): case study on nuclear power plant
    Thiyagarajan, P.
    Thandra, Prasanth Kumar
    Rajan, J.
    Satyamurthy, S. A. V.
    Aghila, G.
    [J]. KERNTECHNIK, 2015, 80 (02) : 150 - +
  • [39] A Privacy-Preserving Asynchronous Averaging Algorithm based on Shamir's Secret Sharing
    Li, Qiongxiu
    Christensen, Mads Graesboll
    [J]. 2019 27TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2019,
  • [40] Unconditional Secure Topology-hiding Broadcast Via Shamir's Secret Sharing
    Bo Mi
    Wu, Bingqing
    Kuang, Fengtian
    Huang darong
    Wu, Shijie
    Lin, Mengting
    [J]. PROCEEDINGS OF 2020 IEEE 9TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE (DDCLS'20), 2020, : 679 - 683