Paper 2013/396

On the Practical Security of a Leakage Resilient Masking Scheme

Emmanuel Prouff, Matthieu Rivain, and Thomas Roche


At TCC 2012, Dziembowski and Faust show how to construct leakage resilient circuits using secret sharing based on the inner product [2]. At Asiacrypt 2012, Ballash et al. turned the latter construction into an efficient masking scheme and they apply it to protect an implementation of AES against side-channel attacks [1]. The so-called Inner-Product masking (IPmasking for short) was claimed to be secure with respect to two different security models: the $\lambda$-limited security model (Section 4 of [1]), and the dth-order security model (see definitions p.8 of [1]). In the former model, the security proof makes sense for a sharing dimension $n > 130$ which is acknowledged impractical by the authors. In the latter model, the scheme is claimed secure up to the order $d = n-1$. In this note, we contradict the dth-order security claim by exhibiting a 1st-order flaw in the masking algorithm for any chosen sharing dimension n.

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
thomas roche @ ssi gouv fr
2013-06-18: received
Short URL
Creative Commons Attribution


      author = {Emmanuel Prouff and Matthieu Rivain and Thomas Roche},
      title = {On the Practical Security of a Leakage Resilient Masking Scheme},
      howpublished = {Cryptology ePrint Archive, Paper 2013/396},
      year = {2013},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.