Algorithms for Switching between Boolean and Arithmetic Masking of Second Order

被引:0
|
作者
Vadnala, Praveen Kumar [1 ]
Grossschaedl, Johann [1 ]
机构
[1] Univ Luxembourg, LACS, L-1359 Luxembourg, Luxembourg
关键词
Differential power analysis; Second-order DPA; Arithmetic masking; Boolean Masking; Provably secure masking; PROVABLY SECURE; IMPLEMENTATIONS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Masking is a widely-used countermeasure to thwart Differential Power Analysis (DPA) attacks, which, depending on the involved operations, can be either Boolean, arithmetic, or multiplicative. When used to protect a cryptographic algorithm that performs both Boolean and arithmetic operations, it is necessary to change the masks from one form to the other in order to be able to unmask the secret value at the end of the algorithm. To date, known techniques for conversion between Boolean and arithmetic masking can only resist first-order DPA. This paper presents the first solution to the problem of converting between Boolean and arithmetic masking of second order. To set the context, we show that a straightforward extension of first-order conversion schemes to second order is not possible. Then, we introduce two algorithms to convert from Boolean to arithmetic masking based on the second-order provably secure S-box output computation method proposed by Rivain et al (FSE 2008). The same can be used to obtain second-order secure arithmetic to Boolean masking. We prove the security of our conversion algorithms using similar arguments as Rivain et al. Finally, we provide implementation results of the algorithms on three different platforms.
引用
收藏
页码:95 / 110
页数:16
相关论文
共 50 条
  • [31] Second-Order Quantified Boolean Logic
    Jiang, Jie-Hong R.
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 4, 2023, : 4007 - 4015
  • [32] On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
    Goudarzi, Dahmun
    Rivain, Matthieu
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 457 - 478
  • [33] Optimal First-Order Boolean Masking for Embedded IoT Devices
    Biryukov, Alex
    Dinu, Daniel
    Le Corre, Yann
    Udovenko, Aleksei
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 22 - 41
  • [34] Theoretical Analysis of Flocking Algorithms in Networks of Second Order Dynamic Agents With Switching Topologies
    Atrianfar, Hajar
    Haeri, Mohammad
    JOURNAL OF DYNAMIC SYSTEMS MEASUREMENT AND CONTROL-TRANSACTIONS OF THE ASME, 2014, 136 (01):
  • [35] Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)
    Piret, G.
    Standaert, F-X.
    IET INFORMATION SECURITY, 2008, 2 (01) : 1 - 11
  • [36] Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs
    Bronchain O.
    Cassiers G.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 553 - 588
  • [37] The recursively Mahlo property in second order arithmetic
    Rathjen, M
    MATHEMATICAL LOGIC QUARTERLY, 1996, 42 (01) : 59 - 66
  • [38] Second-Order Arithmetic Sans Sets†
    Berk, Lon
    PHILOSOPHIA MATHEMATICA, 2013, 21 (03) : 339 - 350
  • [39] SECOND ORDER ARITHMETIC MEANS IN OPERATOR IDEALS
    Kaftal, Victor
    Weiss, Gary
    OPERATORS AND MATRICES, 2007, 1 (02): : 235 - 256
  • [40] Complex analysis in subsystems of second order arithmetic
    Keita Yokoyama
    Archive for Mathematical Logic, 2007, 46 : 15 - 35