Higher-order lookup table masking in essentially constant memory

被引:0
|
作者
Valiveti A. [1 ]
Vivek S. [1 ]
机构
[1] IIIT Bangalore, Bangalore
关键词
IoT security; Masking; PRG; Probing leakage model; S-box; Side-channel attacks; SNI security; Software implementation;
D O I
10.46586/tches.v2021.i4.546-586
中图分类号
学科分类号
摘要
Masking using randomised lookup tables is a popular countermeasure for side-channel attacks, particularly at small masking orders. An advantage of this class of countermeasures for masking S-boxes compared to ISW-based masking is that it supports pre-processing and thus significantly reducing the amount of computation to be done after the unmasked inputs are available. Indeed, the “online” computation can be as fast as just a table lookup. But the size of the randomised lookup table increases linearly with the masking order, and hence the RAM memory required to store pre-processed tables becomes infeasible for higher masking orders. Hence demonstrating the feasibility of full pre-processing of higher-order lookup table-based masking schemes on resource-constrained devices has remained an open problem. In this work, we solve the above problem by implementing a higher-order lookup table-based scheme using an amount of RAM memory that is essentially independent of the masking order. More concretely, we reduce the amount of RAM memory needed for the table-based scheme of Coron et al. (TCHES 2018) approximately by a factor equal to the number of shares. Our technique is based upon the use of pseudorandom number generator (PRG) to minimise the randomness complexity of ISW-based masking schemes proposed by Ishai et al. (ICALP 2013) and Coron et al. (Eurocrypt 2020). Hence we show that for lookup table-based masking schemes, the use of a PRG not only reduces the randomness complexity (now logarithmic in the size of the S-box) but also the memory complexity, and without any significant increase in the overall running time. We have implemented in software the higher-order table-based masking scheme of Coron et al. (TCHES 2018) at tenth order with full pre-processing of a single execution of all the AES S-boxes on a ARM Cortex-M4 device that has 256 KB RAM memory. Our technique requires only 41.2 KB of RAM memory, whereas the original scheme would have needed 440 KB. Moreover, our 8-bit implementation results demonstrate that the online execution time of our variant is about 1.5 times faster compared to the 8-bit bitsliced masked implementation of AES-128. © Licensed under Creative Commons License CC-BY 4.0.
引用
收藏
页码:546 / 586
页数:40
相关论文
共 50 条
  • [21] Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
    Goudarzi, Dahmun
    Journault, Anthony
    Rivain, Matthieu
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 : 3 - 22
  • [22] Correlation Power Analysis and Higher-Order Masking Implementation of WAGE
    Fei, Yunsi
    Gong, Guang
    Gongye, Cheng
    Mandal, Kalikinkar
    Rohit, Raghvendra
    Xu, Tianhong
    Yi, Yunjie
    Zidaric, Nusa
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 593 - 614
  • [23] Attack on a Higher-Order Masking of the AES Based on Homographic Functions
    Prouff, Emmanuel
    Roche, Thomas
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 262 - 281
  • [24] On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
    Goudarzi, Dahmun
    Rivain, Matthieu
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 457 - 478
  • [25] Higher-order memory schema and consciousness experience
    Brown, Richard
    LeDoux, Joseph
    COGNITIVE NEUROPSYCHOLOGY, 2020, 37 (3-4) : 213 - 215
  • [26] Section 3: Memory and higher-order cognition
    Miller, MB
    CANADIAN JOURNAL OF EXPERIMENTAL PSYCHOLOGY-REVUE CANADIENNE DE PSYCHOLOGIE EXPERIMENTALE, 2001, 55 (02): : 150 - 151
  • [27] HIGHER-ORDER TERMS IN THE DIELECTRIC CONSTANT OF IONIC CRYSTALS
    SZIGETI, B
    PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL AND PHYSICAL SCIENCES, 1959, 252 (1269): : 217 - 235
  • [28] Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)
    Piret, G.
    Standaert, F-X.
    IET INFORMATION SECURITY, 2008, 2 (01) : 1 - 11
  • [29] Accelerating Higher-Order Masking of AES Using Composite Field and SIMD
    Miyajan, Abdulaziz
    Shi, Zhijie
    Huang, Chun-Hsi
    Al-Somani, Turki F.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2015, : 575 - 580
  • [30] Speedup Higher-Order Masking of AES sing Normal Basis and SIMD
    Miyajan, Abdulaziz
    Huang, Chun-Hsi
    Al-Somani, Turki F.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 293 - 298