Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on...

Full description

Bibliographic Details
Main Authors: John Gaspoz, Siemen Dhooghe
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2023-03-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/10280
_version_ 1811158045509550080
author John Gaspoz
Siemen Dhooghe
author_facet John Gaspoz
Siemen Dhooghe
author_sort John Gaspoz
collection DOAJ
description This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis.
first_indexed 2024-04-10T05:17:41Z
format Article
id doaj.art-0238f4025d7f4098a6e0666231c94e77
institution Directory Open Access Journal
issn 2569-2925
language English
last_indexed 2024-04-10T05:17:41Z
publishDate 2023-03-01
publisher Ruhr-Universität Bochum
record_format Article
series Transactions on Cryptographic Hardware and Embedded Systems
spelling doaj.art-0238f4025d7f4098a6e0666231c94e772023-03-08T15:37:33ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252023-03-012023210.46586/tches.v2023.i2.155-179Threshold Implementations in Software: Micro-architectural Leakages in AlgorithmsJohn Gaspoz0Siemen Dhooghe1imec-COSIC, ESAT, KU Leuven, Belgiumimec-COSIC, ESAT, KU Leuven, Belgium This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis. https://tches.iacr.org/index.php/TCHES/article/view/10280MaskingMicro-architecturesSide-channel AnalysisProbing Security
spellingShingle John Gaspoz
Siemen Dhooghe
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
Transactions on Cryptographic Hardware and Embedded Systems
Masking
Micro-architectures
Side-channel Analysis
Probing Security
title Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
title_full Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
title_fullStr Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
title_full_unstemmed Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
title_short Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
title_sort threshold implementations in software micro architectural leakages in algorithms
topic Masking
Micro-architectures
Side-channel Analysis
Probing Security
url https://tches.iacr.org/index.php/TCHES/article/view/10280
work_keys_str_mv AT johngaspoz thresholdimplementationsinsoftwaremicroarchitecturalleakagesinalgorithms
AT siemendhooghe thresholdimplementationsinsoftwaremicroarchitecturalleakagesinalgorithms