Journal article Open Access

Symbolic Analysis of Higher-Order Side Channel Countermeasures

Elia Bisi; Filippo Melzani; Vittorio Zaccaria

In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order. To achieve this goal, we promote the search for vulnerabilities from a statistical problem to a purely symbolical one and then provide a method for reasoning about this new symbolical interpretation. Eventually we show, with a synthetic example, how the proposed conceptual tool can be used for exploring the vulnerability space of a cryptographic primitive.

Files (522.0 kB)
Name Size
HECTOR-Symbolic-Analysis-of-Higher-Order-author-version-2017.pdf
md5:b01cedae0009e1822709ddd7c790cd2a
522.0 kB Download
5
5
views
downloads
All versions This version
Views 55
Downloads 55
Data volume 2.6 MB2.6 MB
Unique views 55
Unique downloads 55

Share

Cite as