Higher-order threshold implementations

164Citations
Citations of this article
52Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking. The existing higher-order masking countermeasures that guarantee security in the presence of glitches use multi-party computation techniques and require a lot of resources in terms of circuit area and randomness. The Threshold Implementation method is also based on multi-party computation but it is more area and randomness efficient. Moreover, it typically requires less clock-cycles since all parties can operate simultaneously. However, so far it is only provable secure against 1st -order DPA. We address this gap and extend the Threshold Implementation technique to higher orders. We define generic constructions and prove their security. To illustrate the approach, we provide 1st, 2nd and 3rd-order DPA-resistant implementations of the block cipher KATAN-32. Our analysis of 300 million power traces measured from an FPGA implementation supports the security proofs.

References Powered by Scopus

Differential power analysis

6021Citations
N/AReaders
Get full text

PRESENT: An ultra-lightweight block cipher

2240Citations
N/AReaders
Get full text

Towards sound approaches to counteract power-analysis attacks

827Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Boolean Functions for Cryptography and Coding Theory

288Citations
N/AReaders
Get full text

Leakage assessment methodology a clear roadmap for side-channel evaluations

232Citations
N/AReaders
Get full text

Consolidating masking schemes

199Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., & Rijmen, V. (2014). Higher-order threshold implementations. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8874, pp. 326–343). Springer Verlag. https://doi.org/10.1007/978-3-662-45608-8_18

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 30

71%

Researcher 7

17%

Lecturer / Post doc 3

7%

Professor / Associate Prof. 2

5%

Readers' Discipline

Tooltip

Computer Science 29

64%

Engineering 11

24%

Mathematics 3

7%

Physics and Astronomy 2

4%

Save time finding and organizing research with Mendeley

Sign up for free