Paper 2008/021

Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis

Matthieu Rivain, Emmanuelle Dottax, and Emmanuel Prouff

Abstract

In the recent years, side channel analysis has received a lot of attention, and attack techniques have been improved. Side channel analysis of second order is now successful in breaking implementations of block ciphers supposed to be effectively protected. This progress shows not only the practicability of second order attacks, but also the need for provably secure countermeasures. Surprisingly, while many studies have been dedicated to the attacks, only a few papers have been published about the dedicated countermeasures. In fact, only the method proposed by Schramm and Paar at CT-RSA 2006 enables to thwart second order side channel analysis. In this paper, we introduce two new methods which constitute a worthwhile alternative to Schramm and Paar's proposition. We prove their security in a strong security model and we exhibit a way to signifficantly improve their efficiency by using the particularities of the targeted architectures. Finally, we argue that the introduced methods allow to efficiently protect a wide variety of block ciphers, including AES.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Extended version of a paper accepted for publication in the proceedings of FSE 2008.
Keywords
Side Channel AnalysisSecond Order SCABlock Ciphers ImplementationsMasking Countermeasure.
Contact author(s)
m rivain @ oberthurcs com
History
2008-02-15: last of 2 revisions
2008-01-22: received
See all versions
Short URL
https://ia.cr/2008/021
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/021,
      author = {Matthieu Rivain and Emmanuelle Dottax and Emmanuel Prouff},
      title = {Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis},
      howpublished = {Cryptology {ePrint} Archive, Paper 2008/021},
      year = {2008},
      url = {https://eprint.iacr.org/2008/021}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.