Side-Channel Masking with Common Shares

6Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

To counter side-channel attacks, a masking scheme randomly encodes key-dependent variables into several shares, and transforms operations into the masked correspondence (called gadget) operating on shares. This provably achieves the de facto standard notion of probing security. We continue the long line of works seeking to reduce the overhead of masking. Our main contribution is a new masking scheme over finite fields in which shares of different variables have a part in common. This enables the reuse of randomness/variables across different gadgets, and reduces the total cost of masked implementation. For security order d and circuit size ℓ, the randomness requirement and computational complexity of our scheme areÕ(d2) andÕ(ℓd2) respectively, strictly improving upon the state-of-the-artÕ(d2) andÕ(ℓd3) of Coron et al. at Eurocrypt 2020. A notable feature of our scheme is that it enables a new paradigm in which many intermediates can be precomputed before executing the masked function. The precomputation consumesÕ(ℓd2) and produces Õ(ℓd) variables to be stored in RAM. The cost of subsequent (online) computation is reduced to Õ(ℓd), effectively speeding up e.g., challenge-response authentication protocols. We showcase our method on the AES on ARM Cortex M architecture and perform a T-test evaluation. Our results show a speed-up during the online phase compared with state-of-the-art implementations, at the cost of acceptable RAM consumption and precomputation time. To prove security for our scheme, we propose a new security notion intrinsically supporting randomness/variables reusing across gadgets, and bridging the security of paral lel compositions of gadgets to general compositions, which may be of independent interest.

Cite

CITATION STYLE

APA

Wang, W., Guo, C., Yu, Y., Ji, F., & Su, Y. (2022). Side-Channel Masking with Common Shares. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(3), 290–329. https://doi.org/10.46586/tches.v2022.i3.290-329

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free