Published September 26, 2017 | Version v1
Conference paper Open

Reconciling d+1 Masking in Hardware and Software

  • 1. Institute for Applied Information Processing and Communications (IAIK)

Description

The continually growing number of security-related autonomous devices requires efficient mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides high resistance against SCA at an adjustable level of security. A high level of SCA resistance, however, goes hand in hand with an increasing demand for fresh randomness which drastically increases the implementation costs. Since hardware based masking schemes have other security requirements than software masking schemes, the research in these two fields has been conducted quite independently over the last ten years. One important practical difference is that recently published software schemes achieve a lower randomness footprint than hardware masking schemes. In this work we combine existing software and hardware masking schemes into a unified masking algorithm. We demonstrate how to protect software and hardware implementations using the same masking algorithm, and for lower randomness costs than the separate schemes. Especially for hardware implementations the randomness costs can in some cases be halved over the state of the art. Theoretical considerations as well as practical implementation results are then used for a comparison with existing schemes from different perspectives and at different levels of security.

Files

CHES-Reconciling-d+1-Masking-in-HW-SW-TUG.pdf

Files (834.6 kB)

Name Size Download all
md5:801a5c3aaec3f355b675b5ae17493564
834.6 kB Preview Download

Additional details

Funding

HECTOR – HARDWARE ENABLED CRYPTO AND RANDOMNESS 644052
European Commission