Symbolic Analysis of Higher-Order Side Channel Countermeasures
Creators
- 1. University of Warwick
- 2. STMicroelectronics Italy
- 3. Politecnico di Milano
Description
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order. To achieve this goal, we promote the search for vulnerabilities from a statistical problem to a purely symbolical one and then provide a method for reasoning about this new symbolical interpretation. Eventually we show, with a synthetic example, how the proposed conceptual tool can be used for exploring the vulnerability space of a cryptographic primitive.
Files
HECTOR-Symbolic-Analysis-of-Higher-Order-author-version-2017.pdf
Files
(522.0 kB)
Name | Size | Download all |
---|---|---|
md5:b01cedae0009e1822709ddd7c790cd2a
|
522.0 kB | Preview Download |
Additional details
Related works
- Is previous version of
- 10.1109/TC.2016.2635650 (DOI)