Paper 2009/185
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, and William P. Marnane
Abstract
All-or-Nothing Encryption was introduced by Rivest as a countermeasure to brute force key search attacks. This work identifies a new application for All-or-Nothing Transforms, as a protocol-level countermeasure to Differential Side-Channel Analysis (DSCA). We describe an extension to the All-or-Nothing protocol, that strengthens the DCSA resistance of the cryptosystem. The resultant scheme is a practical alternative to Boolean and arithmetic masking, used to protect implementations of encryption and decryption operations on electronic devices.
Note: Work in progress
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Side-Channel AnalysisDSCADPAMaskingAll-or-Nothing Transforms
- Contact author(s)
- robertmce @ eleceng ucc ie
- History
- 2009-05-02: received
- Short URL
- https://ia.cr/2009/185
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/185, author = {Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane}, title = {All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/185}, year = {2009}, url = {https://eprint.iacr.org/2009/185} }