Paper 2009/185

All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis

Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, and William P. Marnane

Abstract

All-or-Nothing Encryption was introduced by Rivest as a countermeasure to brute force key search attacks. This work identifies a new application for All-or-Nothing Transforms, as a protocol-level countermeasure to Differential Side-Channel Analysis (DSCA). We describe an extension to the All-or-Nothing protocol, that strengthens the DCSA resistance of the cryptosystem. The resultant scheme is a practical alternative to Boolean and arithmetic masking, used to protect implementations of encryption and decryption operations on electronic devices.

Note: Work in progress

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Unknown where it was published
Keywords
Side-Channel AnalysisDSCADPAMaskingAll-or-Nothing Transforms
Contact author(s)
robertmce @ eleceng ucc ie
History
2009-05-02: received
Short URL
https://ia.cr/2009/185
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/185,
      author = {Robert P.  McEvoy and Michael Tunstall and Claire Whelan and Colin C.  Murphy and William P.  Marnane},
      title = {All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis},
      howpublished = {Cryptology ePrint Archive, Paper 2009/185},
      year = {2009},
      note = {\url{https://eprint.iacr.org/2009/185}},
      url = {https://eprint.iacr.org/2009/185}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.