Threshold implementations of small S-boxes

被引:35
作者
Bilgin, Begul [1 ,2 ,3 ]
Nikova, Svetla [1 ,2 ]
Nikov, Ventzislav [4 ]
Rijmen, Vincent [1 ,2 ]
Tokareva, Natalia [5 ,6 ]
Vitkup, Valeriya [5 ,6 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC, Leuven, Belgium
[2] iMinds, Leuven, Belgium
[3] Univ Twente, EEMCS DIES, NL-7500 AE Enschede, Netherlands
[4] NXP Semicond, Leuven, Belgium
[5] Sobolev Inst Math, Novosibirsk, Russia
[6] Novosibirsk State Univ, Novosibirsk 630090, Russia
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2015年 / 7卷 / 01期
基金
俄罗斯基础研究基金会;
关键词
DPA; Masking; Glitches; Sharing; Nonlinear functions; S-box; Decomposition; POWER ANALYSIS; HARDWARE; MASKING; CLASSIFICATION;
D O I
10.1007/s12095-014-0104-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Threshold implementation (TI) is a masking method that provides security against first-order DPAwithminimal assumptions on the hardware. It is based on multi-party computation and secret sharing. In this paper, we provide an efficient technique to find TIs for all 3 and 4-bit permutations which also covers the set of 3 x 3 and 4 x 4 invertible S-boxes. We also discuss alternative methods to construct shared functions by changing the number of variables or shares. Moreover, we further consider the TI of 5-bit almost bent and 6-bit almost perfect nonlinear permutations. Finally, we compare the areas of these various TIs.
引用
收藏
页码:3 / 33
页数:31
相关论文
共 47 条
[31]  
Leander G, 2007, LECT NOTES COMPUT SC, V4547, P159
[32]  
Lidl R., 1997, ENCY MATH ITS APPL
[33]  
Mangard S, 2005, LECT NOTES COMPUT SC, V3659, P157
[34]  
Mangard S., 2008, Power analysis attacks: Revealing the secrets of smart cards, VVolume 31
[35]  
Moradi A, 2012, LECT NOTES COMPUT SC, V7237, P428, DOI 10.1007/978-3-642-29011-4_26
[36]  
Moradi A, 2011, LECT NOTES COMPUT SC, V6632, P69, DOI 10.1007/978-3-642-20465-4_6
[37]  
Moradi A, 2010, LECT NOTES COMPUT SC, V6225, P125, DOI 10.1007/978-3-642-15031-9_9
[38]   Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches [J].
Nikova, Svetla ;
Rijmen, Vincent ;
Schlaeffer, Martin .
JOURNAL OF CRYPTOLOGY, 2011, 24 (02) :292-321
[39]  
Nikova S, 2009, LECT NOTES COMPUT SC, V5461, P218, DOI 10.1007/978-3-642-00730-9_14
[40]  
Oswald E, 2005, LECT NOTES COMPUT SC, V3557, P413