Title
Threshold Implementations in Industry: A Case Study on SHA-256
Abstract
Implementing efficient countermeasures against side-channel attacks is a challenge since two decades. Especially in hardware, many masking countermeasure implementations failed due to first-order leakages caused by glitches or other effects such as early evaluation and unbalanced routing. The Threshold Implementation (TI) countermeasure was proposed a decade ago and it provides provable security even in the presence of such effects. In this talk, I discuss different state of the art secure logic styles and TIs from an industry perspective. As a case study, we consider SHA-256 which is especially interesting to mask due to its ARX-based design. I present various techniques for efficient mask conversion that can be applied to SHA-256 and discuss solutions for higher-order security.
Year
DOI
Venue
2016
10.1145/2996366.2996373
TIS@CCS
Keywords
Field
DocType
Side-channel analysis, Threshold Implementation, Boolean-to-arithmetic masking, DPA, hardware security
Countermeasure,Glitch,Hardware security module,Computer security,Sociology,Implementation,Provable security
Conference
ISBN
Citations 
PageRank 
978-1-4503-4575-0
0
0.34
References 
Authors
0
1
Name
Order
Citations
PageRank
Michael Hutter134525.26