Strong 8-bit Sboxes with Efficient Masking in Hardware

被引:8
作者
Boss, Erik [1 ]
Grosso, Vincent [1 ]
Gueneysu, Tim [2 ]
Leander, Gregor [1 ]
Moradi, Amir [1 ]
Schneider, Tobias [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Univ Bremen & DFKI, Bremen, Germany
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016 | 2016年 / 9813卷
关键词
THRESHOLD IMPLEMENTATIONS; BLOCK ENCRYPTION;
D O I
10.1007/978-3-662-53140-2_9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Block ciphers are arguably the most important cryptographic primitive in practice. While their security against mathematical attacks is rather well understood, physical threats such as side-channel analysis (SCA) still pose a major challenge for their security. An effective countermeasure to thwart SCA is using a cipher representation that applies the threshold implementation (TI) concept. However, there are hardly any results available on how this concept can be adopted for block ciphers with large (i.e., 8-bit) Sboxes. In this work we provide a systematic analysis on and search for 8-bit Sbox constructions that can intrinsically feature the TI concept, while still providing high resistance against cryptanalysis. Our study includes investigations on Sboxes constructed from smaller ones using Feistel, SPN, or MISTY network structures. As a result, we present a set of new Sboxes that not only provide strong cryptographic criteria, but are also optimized for TI. We believe that our results will found an inspiring basis for further research on high-security block ciphers that intrinsically feature protection against physical attacks.
引用
收藏
页码:171 / 193
页数:23
相关论文
共 41 条
[1]   Midori: A Block Cipher for Low Energy [J].
Banik, Subhadeep ;
Bogdanov, Andrey ;
Isobe, Takanori ;
Shibutani, Kyoji ;
Hiwatari, Harunaga ;
Akishita, Toru ;
Regazzoni, Francesco .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 :411-436
[2]  
Barkan E, 2002, LECT NOTES COMPUT SC, V2501, P160
[3]  
Barreto P.S.L.M., 2000, PRIMITIVE UNPUB, P97
[4]  
Beierle C., 2016, LNCS IN PRESS
[5]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[6]  
Bilgin B, 2014, LECT NOTES COMPUT SC, V8874, P326, DOI 10.1007/978-3-662-45608-8_18
[7]   Trade-Offs for Threshold Implementations Illustrated on AES [J].
Bilgin, Begul ;
Gierlichs, Benedikt ;
Nikova, Svetla ;
Nikov, Ventzislav ;
Rijmen, Vincent .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (07) :1188-1200
[8]   Threshold implementations of small S-boxes [J].
Bilgin, Begul ;
Nikova, Svetla ;
Nikov, Ventzislav ;
Rijmen, Vincent ;
Tokareva, Natalia ;
Vitkup, Valeriya .
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (01) :3-33
[9]  
Bilgin B, 2014, LECT NOTES COMPUT SC, V8469, P267
[10]  
Bilgin B, 2013, LECT NOTES COMPUT SC, V8086, P142, DOI 10.1007/978-3-642-40349-1_9