Paper 2016/647

Strong 8-bit Sboxes with Efficient Masking in Hardware

Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, and Tobias Schneider

Abstract

Block ciphers are arguably the most important cryptographic primitive in practice. While their security against mathematical attacks is rather well understood, physical threats such as side-channel analysis (SCA) still pose a major challenge for their security. An effective countermeasure to thwart SCA is using a cipher representation that applies the threshold implementation (TI) concept. However, there are hardly any results available on how this concept can be adopted for block ciphers with large (i.e., 8-bit) Sboxes. In this work we provide a systematic analysis on and search for 8-bit Sbox constructions that can intrinsically feature the TI concept, while still providing high resistance against cryptanalysis. Our study includes investigations on Sboxes constructed from smaller ones using Feistel, SPN, or MISTY network structures. As a result, we present a set of new Sboxes that not only provide strong cryptographic criteria, but are also optimized for TI. We believe that our results will found an inspiring basis for further research on high-security block ciphers that intrinsically feature protection against physical attacks.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
A major revision of an IACR publication in CHES 2016
Keywords
side-channel analysisthreshold implementation8-bit Sboxes
Contact author(s)
tobias schneider-a7a @ rub de
History
2016-06-24: received
Short URL
https://ia.cr/2016/647
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/647,
      author = {Erik Boss and Vincent Grosso and Tim Güneysu and Gregor Leander and Amir Moradi and Tobias Schneider},
      title = {Strong 8-bit Sboxes with Efficient Masking in Hardware},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/647},
      year = {2016},
      url = {https://eprint.iacr.org/2016/647}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.