Published December 5, 2016 | Version v1
Journal article Open

Symbolic Analysis of Higher-Order Side Channel Countermeasures

  • 1. ‎University of Warwick
  • 2. STMicroelectronics Italy
  • 3. Politecnico di Milano

Description

In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order. To achieve this goal, we promote the search for vulnerabilities from a statistical problem to a purely symbolical one and then provide a method for reasoning about this new symbolical interpretation. Eventually we show, with a synthetic example, how the proposed conceptual tool can be used for exploring the vulnerability space of a cryptographic primitive.

Files

HECTOR-Symbolic-Analysis-of-Higher-Order-author-version-2017.pdf

Files (522.0 kB)

Additional details

Related works

Is previous version of
10.1109/TC.2016.2635650 (DOI)

Funding

HECTOR – HARDWARE ENABLED CRYPTO AND RANDOMNESS 644052
European Commission