Paper 2015/597
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi and Alexander Wild
Abstract
Higher-order side-channel attacks are becoming amongst the major interests of academia as well as industry sector. It is indeed being motivated by the development of countermeasures which can prevent the leakages up to certain orders. As a concrete example, threshold implementation (TI) as an efficient way to realize Boolean masking in hardware is able to avoid first-order leakages. Trivially, the attacks conducted at second (and higher) orders can exploit the corresponding leakages hence devastating the provided security. Hence, the extension of TI to higher orders was being expected which has been presented at ASIACRYPT 2014. Following its underlying univariate settings it can provide security at higher orders, and its area and time overheads naturally increase with the desired security order. In this work we look at the feasibility of higher-order attacks on first-order TI from another perspective. Instead of increasing the order of resistance by employing higher-order TIs, we realize the first-order TI designs following the principles of a power-equalization technique dedicated to FPGA platforms, that naturally leads to hardening higher-order attacks. We show that although the first-order TI designs, which are additionally equipped by the power-equalization methodology, have significant area overhead, they can maintain the same throughput and more importantly can avoid the higher-order leakages to be practically exploitable by up to 1 billion traces.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- A minor revision of an IACR publication in CHES 2015
- Keywords
- side-channel analysiscountermeasurethreshold implementationGliFredFPGAhidingmasking
- Contact author(s)
- amir moradi @ rub de
- History
- 2015-06-21: received
- Short URL
- https://ia.cr/2015/597
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/597, author = {Amir Moradi and Alexander Wild}, title = {Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/597}, year = {2015}, url = {https://eprint.iacr.org/2015/597} }