Efficient Masked S-Boxes Processing - A Step Forward

被引:0
|
作者
Grosso, Vincent [1 ]
Prouff, Emmanuel [2 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Catholic Univ Louvain, ICTEAM, ELEN, Crypto Grp, Louvain, Belgium
[2] ANSSI, F-75700 Paris, France
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014 | 2014年 / 8469卷
关键词
HIGHER-ORDER MASKING; PROVABLY SECURE;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To defeat side-channel attacks, the implementation of block cipher algorithms in embedded devices must include dedicated countermeasures. To this end, security designers usually apply secret sharing techniques and build masking schemes to securely operate an shared data. The popularity of this approach can be explained by the fact that it enables formal security proofs. The construction of masking schemes thwarting higher-order side-channel attacks, which correspond to a powerful adversary able to exploit the leakage of the different shares, has been a hot topic during the last decade. Several solutions have been proposed, usually at the cost of significant performance overheads. As a result, the quest for efficient masked S-box implementations is still ongoing. In this paper, we focus on the scheme proposed by Carlet et al at FSE 2012, and latter improved by Roy and Vivek at CHES 2013. This scheme is today the most efficient one to secure a generic S-box at any order. By exploiting an idea introduced by Coron et al at FSE 2013, we show that Carlet et al's scheme can still be improved for S-boxes with input dimension larger than four. We obtain this result thanks to a new definition for the addition-chain exponentiation used during the masked S-box processing. For the AES and DES S-boxes, we show that our improvement leads to significant efficiency gains.
引用
收藏
页码:251 / 266
页数:16
相关论文
共 50 条
  • [41] NUMBER OF NONLINEAR REGULAR S-BOXES
    YOUSSEF, AM
    TAVARES, SE
    ELECTRONICS LETTERS, 1995, 31 (19) : 1643 - 1644
  • [42] The design of s-boxes by simulated annealing
    Clark, JA
    Jacob, JL
    Stepney, S
    NEW GENERATION COMPUTING, 2005, 23 (03) : 219 - 231
  • [43] GOOD S-BOXES ARE EASY TO FIND
    ADAMS, C
    TAVARES, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 612 - 615
  • [44] Threshold implementations of small S-boxes
    Begül Bilgin
    Svetla Nikova
    Ventzislav Nikov
    Vincent Rijmen
    Natalia Tokareva
    Valeriya Vitkup
    Cryptography and Communications, 2015, 7 : 3 - 33
  • [45] Trace Representations of S-boxes and Their Application
    Zeng Xiang-yong 1
    2. State Key Laboratory of Information Security (Graduate School of Chinese Academy of Sciences)
    3. College of Mathematics and Computer Science
    WuhanUniversityJournalofNaturalSciences, 2004, (02) : 173 - 176
  • [46] Research of Lyapunov exponent of S-boxes
    Zang Hong-Yan
    Fan Xiu-Bin
    Min Le-Quan
    Han Dan-Dan
    ACTA PHYSICA SINICA, 2012, 61 (20)
  • [47] Counting Active S-Boxes is not Enough
    Dunkelman, Orr
    Kumar, Abhishek
    Lambooij, Eran
    Sanadhya, Somitra Kumar
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 332 - 344
  • [48] Random S-boxes in Symmetric Ciphers
    Lisickiy, Konstantin
    Lisickaya, Iryna
    Dolgov, Victor
    Kuznetsova, Kateryna
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 889 - 894
  • [49] Cellular automata based S-boxes
    Luca Mariot
    Stjepan Picek
    Alberto Leporati
    Domagoj Jakobovic
    Cryptography and Communications, 2019, 11 : 41 - 62
  • [50] On the classification of 4 bit S-Boxes
    Leander, G.
    Poschmann, A.
    ARITHMETIC OF FINITE FIELDS, PROCEEDINGS, 2007, 4547 : 159 - +