Categorizing all linear codes of IPM over F28\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}${\mathbb {F}}_{2^{8}}$\end{document}

被引:0
作者
Wei Cheng
Sylvain Guilley
Jean-Luc Danger
机构
[1] LTCI,Département d’informatique de l’ENS (DIENS)
[2] Télécom Paris,undefined
[3] Institut Polytechnique de Paris,undefined
[4] Secure-IC S.A.S.,undefined
[5] ENS,undefined
[6] CNRS,undefined
[7] PSL University,undefined
关键词
Inner product masking; Coding theory; Dual distance; Optimal linear code; Expanded code; Weight enumerator; Kissing number; 94A60; 94B05; 62B10; 94A17;
D O I
10.1007/s12095-021-00483-1
中图分类号
学科分类号
摘要
Inner Product Masking (IPM) is a generalization of several masking schemes including the Boolean one to protect cryptographic implementation against side-channel analysis. The core competitiveness of IPM is that it provides higher side-channel resistance than Boolean masking with the same number of shares. In this paper, we follow a coding theoretic approach and categorize all linear codes of IPM with n = 2 shares over the finite field F28\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}${\mathbb {F}}_{2^{8}}$\end{document} in terms of side-channel resistance. We focus on 2-share masking schemes, as they provide, at bit-level, as high as 3rd-order security (much higher than the 1st-order security of Boolean masking). We present the optimal codes for IPM in the sense of side-channel resistance assessed by the signal-to-noise ratio (SNR) and the mutual information (MI). We also show that IPM with equivalent linear codes have comparable level of side-channel resistance. Furthermore, we take the Best Known Linear Codes into consideration for comparison. The numerical results of SNR and MI confirm the effectiveness of our proposal for categorizing.
引用
收藏
页码:527 / 542
页数:15
相关论文
共 17 条
  • [1] Betsumiya K(2001)Binary optimal odd formally self-dual codes Des. Codes Cryptography 23 11-22
  • [2] Harada M(2014)Achieving side-channel high-order correlation immunity with leakage squeezing J. Cryptographic Engineering 4 107-121
  • [3] Carlet C(2018)Statistical properties of side-channel and fault injection attacks using coding theory Cryptogr. Commun. 10 909-933
  • [4] Danger J-L(2021)Optimizing inner product masking scheme by a coding theory approach IEEE Trans. Inf. Forensics Secur. 16 220-235
  • [5] Guilley S(2020)Efficient and private computations with code-based masking IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020 128-171
  • [6] Maghrebi H(undefined)undefined undefined undefined undefined-undefined
  • [7] Prouff E(undefined)undefined undefined undefined undefined-undefined
  • [8] Carlet C(undefined)undefined undefined undefined undefined-undefined
  • [9] Guilley S(undefined)undefined undefined undefined undefined-undefined
  • [10] Cheng W(undefined)undefined undefined undefined undefined-undefined