Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2023-03-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/10280 |
_version_ | 1811158045509550080 |
---|---|
author | John Gaspoz Siemen Dhooghe |
author_facet | John Gaspoz Siemen Dhooghe |
author_sort | John Gaspoz |
collection | DOAJ |
description |
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis.
|
first_indexed | 2024-04-10T05:17:41Z |
format | Article |
id | doaj.art-0238f4025d7f4098a6e0666231c94e77 |
institution | Directory Open Access Journal |
issn | 2569-2925 |
language | English |
last_indexed | 2024-04-10T05:17:41Z |
publishDate | 2023-03-01 |
publisher | Ruhr-Universität Bochum |
record_format | Article |
series | Transactions on Cryptographic Hardware and Embedded Systems |
spelling | doaj.art-0238f4025d7f4098a6e0666231c94e772023-03-08T15:37:33ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252023-03-012023210.46586/tches.v2023.i2.155-179Threshold Implementations in Software: Micro-architectural Leakages in AlgorithmsJohn Gaspoz0Siemen Dhooghe1imec-COSIC, ESAT, KU Leuven, Belgiumimec-COSIC, ESAT, KU Leuven, Belgium This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis. https://tches.iacr.org/index.php/TCHES/article/view/10280MaskingMicro-architecturesSide-channel AnalysisProbing Security |
spellingShingle | John Gaspoz Siemen Dhooghe Threshold Implementations in Software: Micro-architectural Leakages in Algorithms Transactions on Cryptographic Hardware and Embedded Systems Masking Micro-architectures Side-channel Analysis Probing Security |
title | Threshold Implementations in Software: Micro-architectural Leakages in Algorithms |
title_full | Threshold Implementations in Software: Micro-architectural Leakages in Algorithms |
title_fullStr | Threshold Implementations in Software: Micro-architectural Leakages in Algorithms |
title_full_unstemmed | Threshold Implementations in Software: Micro-architectural Leakages in Algorithms |
title_short | Threshold Implementations in Software: Micro-architectural Leakages in Algorithms |
title_sort | threshold implementations in software micro architectural leakages in algorithms |
topic | Masking Micro-architectures Side-channel Analysis Probing Security |
url | https://tches.iacr.org/index.php/TCHES/article/view/10280 |
work_keys_str_mv | AT johngaspoz thresholdimplementationsinsoftwaremicroarchitecturalleakagesinalgorithms AT siemendhooghe thresholdimplementationsinsoftwaremicroarchitecturalleakagesinalgorithms |