Efficient Masked S-Boxes Processing - A Step Forward

被引:0
|
作者
Grosso, Vincent [1 ]
Prouff, Emmanuel [2 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Catholic Univ Louvain, ICTEAM, ELEN, Crypto Grp, Louvain, Belgium
[2] ANSSI, F-75700 Paris, France
来源
关键词
HIGHER-ORDER MASKING; PROVABLY SECURE;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To defeat side-channel attacks, the implementation of block cipher algorithms in embedded devices must include dedicated countermeasures. To this end, security designers usually apply secret sharing techniques and build masking schemes to securely operate an shared data. The popularity of this approach can be explained by the fact that it enables formal security proofs. The construction of masking schemes thwarting higher-order side-channel attacks, which correspond to a powerful adversary able to exploit the leakage of the different shares, has been a hot topic during the last decade. Several solutions have been proposed, usually at the cost of significant performance overheads. As a result, the quest for efficient masked S-box implementations is still ongoing. In this paper, we focus on the scheme proposed by Carlet et al at FSE 2012, and latter improved by Roy and Vivek at CHES 2013. This scheme is today the most efficient one to secure a generic S-box at any order. By exploiting an idea introduced by Coron et al at FSE 2013, we show that Carlet et al's scheme can still be improved for S-boxes with input dimension larger than four. We obtain this result thanks to a new definition for the addition-chain exponentiation used during the masked S-box processing. For the AES and DES S-boxes, we show that our improvement leads to significant efficiency gains.
引用
收藏
页码:251 / 266
页数:16
相关论文
共 50 条
  • [1] Efficient and simple method for designing chaotic S-boxes
    Asim, Muhammad
    Jeoti, Varun
    ETRI JOURNAL, 2008, 30 (01) : 170 - 172
  • [2] Memory efficient implementation of AES S-BOXES on FPGA
    Aziz, Arshad
    Ikram, Nassar
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2007, 16 (04) : 603 - 611
  • [3] Self-timed Masking: Implementing Masked S-Boxes Without Registers
    Simoes, Mateus
    Bossuet, Lilian
    Bruneau, Nicolas
    Grosso, Vincent
    Haddad, Patrick
    Sarno, Thomas
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2022, 2023, 13820 : 146 - 164
  • [4] ON THE DESIGN OF S-BOXES
    WEBSTER, AF
    TAVARES, SE
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 523 - 534
  • [5] DEGENERATE S-BOXES
    Lisickiy, K. E.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2018, (01) : 129 - 138
  • [6] Nonlinearities of S-boxes
    Carlet, Claude
    Ding, Cunsheng
    FINITE FIELDS AND THEIR APPLICATIONS, 2007, 13 (01) : 121 - 135
  • [7] Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog
    Perrin, Leo
    Udovenko, Aleksei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 99 - 124
  • [8] Fast Novel Efficient S-Boxes with Expanded DNA Codes
    Maolood A.T.
    Farhan A.K.
    El-Sobky W.I.
    Zaky H.N.
    Zayed H.L.
    Ahmed H.E.
    Diab T.O.
    Security and Communication Networks, 2023, 2023
  • [9] DESIGNING MORE EFFICIENT NOVEL S8 S-BOXES
    Shah, Tariq
    Qureshi, Ayesha
    Khan, Muhammad Fahad
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2020, 12 (02): : 97 - 107
  • [10] Improving quality of DES S-boxes by cellular automata-based S-boxes
    Miroslaw Szaban
    Franciszek Seredynski
    The Journal of Supercomputing, 2011, 57 : 216 - 226