Abstract | ||
---|---|---|
Implementing efficient countermeasures against side-channel attacks is a challenge since two decades. Especially in hardware, many masking countermeasure implementations failed due to first-order leakages caused by glitches or other effects such as early evaluation and unbalanced routing. The Threshold Implementation (TI) countermeasure was proposed a decade ago and it provides provable security even in the presence of such effects. In this talk, I discuss different state of the art secure logic styles and TIs from an industry perspective. As a case study, we consider SHA-256 which is especially interesting to mask due to its ARX-based design. I present various techniques for efficient mask conversion that can be applied to SHA-256 and discuss solutions for higher-order security. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1145/2996366.2996373 | TIS@CCS |
Keywords | Field | DocType |
Side-channel analysis, Threshold Implementation, Boolean-to-arithmetic masking, DPA, hardware security | Countermeasure,Glitch,Hardware security module,Computer security,Sociology,Implementation,Provable security | Conference |
ISBN | Citations | PageRank |
978-1-4503-4575-0 | 0 | 0.34 |
References | Authors | |
0 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Michael Hutter | 1 | 345 | 25.26 |