[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?

Paper 2018/006

Higher Order Side-Channel Attacks Resilient S-boxes

Liran Lerman, Stjepan Picek, Nikita Veshchikov, and Olivier Markowitch

Abstract

Masking schemes represent a well-researched and successful option to follow when considering side-channel countermeasures. Still, such measures increase the implementation cost in term of power consumption, clock cycles, and random numbers generation. In fact, the higher the order of protection against side-channel adversaries, the higher the implementation cost of countermeasures. S-boxes represent the most vulnerable part in an implementation when considering side-channel adversary. In this paper, we investigate how to generate S-boxes that have improved resilience against varying orders of side-channel attacks while minimising the implementation costs. We examine whether S-boxes generated against a certain order of attack also represent a good solution when considering different order of attacks. We demonstrate that we successfully generated S-boxes resilient against a certain physical attack order but the improvements are small. As a result, S-boxes that are resilient against first order attacks stay resilient against higher-order attacks, which saves computational power during the design of higher-order side-channel attacks resilient S-boxes.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
S-box constructionGenetic algorithmsHigher-order side-channel analysisCorrelation power analysis
Contact author(s)
picek stjepan @ gmail com
History
2018-03-08: revised
2018-01-02: received
See all versions
Short URL
https://ia.cr/2018/006
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/006,
      author = {Liran Lerman and Stjepan Picek and Nikita Veshchikov and Olivier Markowitch},
      title = {Higher Order Side-Channel Attacks Resilient S-boxes},
      howpublished = {Cryptology {ePrint} Archive, Paper 2018/006},
      year = {2018},
      url = {https://eprint.iacr.org/2018/006}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.