Cryptology ePrint Archive: Report 2005/174
On the Automatic Construction of Indistinguishable Operations
Manuel Barbosa and Dan Page
Abstract: An increasingly important design constraint for software running on ubiquitous
computing devices is security, particularly against physical methods such as
side-channel attack. One well studied methodology for defending against such
attacks is the concept of indistinguishable functions which leak no
information about program control flow since all execution paths are
computationally identical. However, the constructing such functions by hand
is laborious and error prone as their complexity increases. We investigate
techniques for automating this process and find that effective solutions can
be constructed with only minor amounts of computational effort.
Category / Keywords: implementation / Side-channel cryptanalysis, Countermeasures, Simple Power Analysis
Date: received 8 Jun 2005
Contact author: mbb at di uminho pt
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20050613:065028 (All versions of this report)
Short URL: ia.cr/2005/174
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]