Paper 2018/189

Threshold Implementation in Software - Case Study of PRESENT

Pascal Sasdrich, René Bock, and Amir Moradi

Abstract

Masking is one of the predominantly deployed countermeasures in order to prevent side-channel analysis (SCA) attacks. Over the years, various masking schemes have been proposed. However, the implementation of Boolean masking schemes has proven to be difficult in particular for embedded devices due to undisclosed architecture details and device internals. In this article, we investigate the application of Threshold Implementation (TI) in terms of Boolean masking in software using the PRESENT cipher as a case study. Since TI has proven to be a proper solution in order to implement Boolean masking for hardware circuits, we apply the same concept for software implementations and compare it to classical first- and second-order Boolean masking schemes. Eventually, our practical security evaluations reveal that amongst all our considered implementation variants only the TI can provide first-order security while all others still exhibit detectable first-order leakage.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. COSADE 2018
Keywords
Side-Channel AnalysisBoolean maskingThreshold Implementationt-testmicro-controllerAVRPRESENT
Contact author(s)
pascal sasdrich @ rub de
History
2018-02-20: received
Short URL
https://ia.cr/2018/189
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/189,
      author = {Pascal Sasdrich and René Bock and Amir Moradi},
      title = {Threshold Implementation in Software - Case Study of {PRESENT}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2018/189},
      year = {2018},
      url = {https://eprint.iacr.org/2018/189}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.