Efficient Masked S-Boxes Processing - A Step Forward

被引:0
|
作者
Grosso, Vincent [1 ]
Prouff, Emmanuel [2 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Catholic Univ Louvain, ICTEAM, ELEN, Crypto Grp, Louvain, Belgium
[2] ANSSI, F-75700 Paris, France
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014 | 2014年 / 8469卷
关键词
HIGHER-ORDER MASKING; PROVABLY SECURE;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To defeat side-channel attacks, the implementation of block cipher algorithms in embedded devices must include dedicated countermeasures. To this end, security designers usually apply secret sharing techniques and build masking schemes to securely operate an shared data. The popularity of this approach can be explained by the fact that it enables formal security proofs. The construction of masking schemes thwarting higher-order side-channel attacks, which correspond to a powerful adversary able to exploit the leakage of the different shares, has been a hot topic during the last decade. Several solutions have been proposed, usually at the cost of significant performance overheads. As a result, the quest for efficient masked S-box implementations is still ongoing. In this paper, we focus on the scheme proposed by Carlet et al at FSE 2012, and latter improved by Roy and Vivek at CHES 2013. This scheme is today the most efficient one to secure a generic S-box at any order. By exploiting an idea introduced by Coron et al at FSE 2013, we show that Carlet et al's scheme can still be improved for S-boxes with input dimension larger than four. We obtain this result thanks to a new definition for the addition-chain exponentiation used during the masked S-box processing. For the AES and DES S-boxes, we show that our improvement leads to significant efficiency gains.
引用
收藏
页码:251 / 266
页数:16
相关论文
共 50 条
  • [32] Optimized simulated annealing for efficient generation of highly nonlinear S-boxes
    Alexandr Kuznetsov
    Nikolay Poluyanenko
    Emanuele Frontoni
    Sergey Kandiy
    Olha Pieshkova
    Soft Computing, 2024, 28 : 3905 - 3920
  • [33] An efficient chaotic image encryption based on alternate circular S-boxes
    Xuanping Zhang
    Yanbin Mao
    Zhongmeng Zhao
    Nonlinear Dynamics, 2014, 78 : 359 - 369
  • [34] New Low-Area Designs for the AES Forward, Inverse and Combined S-Boxes
    Reyhani-Masoleh, Arash
    Taha, Mostafa
    Ashmawy, Doaa
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (12) : 1757 - 1773
  • [35] Generation of 8 x 8 S-boxes using 4 x 4 optimal S-boxes
    Tiwari, Vikas
    Singh, Ajeet
    Tentu, Appala Naidu
    Saxena, Ashutosh
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (3-4) : 399 - 413
  • [36] A Note on Rotation Symmetric S-boxes
    Guangpu Gao
    Dongdai Lin
    Wenfen Liu
    Journal of Systems Science and Complexity, 2019, 32 : 1460 - 1472
  • [37] PAIRS AND TRIPLETS OF DES S-BOXES
    DAVIES, D
    MURPHY, S
    JOURNAL OF CRYPTOLOGY, 1995, 8 (01) : 1 - 25
  • [38] On the nonlinearity of S-boxes and linear codes
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (03): : 345 - 361
  • [39] A Note on Rotation Symmetric S-boxes
    GAO Guangpu
    LIN Dongdai
    LIU Wenfen
    JournalofSystemsScience&Complexity, 2019, 32 (05) : 1460 - 1472
  • [40] The design of S-boxes by simulated annealing
    John A. Clark
    Jeremy L. Jacob
    Susan Stepney
    New Generation Computing, 2005, 23 : 219 - 231