Cryptology ePrint Archive: Report 2005/174

On the Automatic Construction of Indistinguishable Operations

Manuel Barbosa and Dan Page

Abstract: An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel attack. One well studied methodology for defending against such attacks is the concept of indistinguishable functions which leak no information about program control flow since all execution paths are computationally identical. However, the constructing such functions by hand is laborious and error prone as their complexity increases. We investigate techniques for automating this process and find that effective solutions can be constructed with only minor amounts of computational effort.

Category / Keywords: implementation / Side-channel cryptanalysis, Countermeasures, Simple Power Analysis

Date: received 8 Jun 2005

Contact author: mbb at di uminho pt

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20050613:065028 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]