Trade-Offs for Threshold Implementations Illustrated on AES

被引:48
作者
Bilgin, Begul [1 ,2 ]
Gierlichs, Benedikt [1 ]
Nikova, Svetla [1 ]
Nikov, Ventzislav [3 ]
Rijmen, Vincent [1 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC & iMinds, B-3001 Leuven, Belgium
[2] Univ Twente, EEMCS SCS, NL-7500 AE Enschede, Netherlands
[3] NXP Semicond, B-3001 Leuven, Belgium
关键词
AES; first-order differential power analysis; glitches; higher-order differential power analysis; S-box; sharing; threshold implementation (TI); POWER ANALYSIS; LEAKAGE;
D O I
10.1109/TCAD.2015.2419623
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded cryptographic devices are vulnerable to power analysis attacks. Threshold implementations (TIs) provide provable security against first-order power analysis attacks for hardware and software implementations. Like masking, the approach relies on secret sharing but it differs in the implementation of logic functions. While masking can fail to provide protection due to glitches in the circuit, TIs rely on few assumptions about the hardware and are fully compatible with standard design flows. We investigate two important properties of TIs in detail and point out interesting trade-offs between circuit area and randomness requirements. We propose two new TIs of AES that, starting from a common previously published implementation, illustrate possible trade-offs. We provide concrete ASIC implementation results for all three designs using the same library, and we evaluate the practical security of all three designs on the same FPGA platform. Our analysis allow us to directly compare the security provided by the different trade-offs, and to quantify the associated hardware cost.
引用
收藏
页码:1188 / 1200
页数:13
相关论文
共 28 条
[1]  
AIST, 2015, SID CHANN ATT STAND
[2]   Mutual Information Analysis: a Comprehensive Study [J].
Batina, Lejla ;
Gierlichs, Benedikt ;
Prouff, Emmanuel ;
Rivain, Matthieu ;
Standaert, Francois-Xavier ;
Veyrat-Charvillon, Nicolas .
JOURNAL OF CRYPTOLOGY, 2011, 24 (02) :269-291
[3]  
Bertoni G., 2008, NIST SHA 3 CONTEST
[4]  
Bertoni G., 2010, P 18 IFAC S AUT CONT, P1
[5]  
Bilgin B., 2014, CRYPTOGR COMMUN, P1
[6]  
Bilgin B, 2014, LECT NOTES COMPUT SC, V8469, P267
[7]  
Bilgin B, 2013, LECT NOTES COMPUT SC, V8086, P142, DOI 10.1007/978-3-642-40349-1_9
[8]  
Bilgin B, 2012, LECT NOTES COMPUT SC, V7428, P76, DOI 10.1007/978-3-642-33027-8_5
[9]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[10]  
Canright D, 2005, LECT NOTES COMPUT SC, V3659, P441