Paper 2015/597

Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?

Amir Moradi and Alexander Wild

Abstract

Higher-order side-channel attacks are becoming amongst the major interests of academia as well as industry sector. It is indeed being motivated by the development of countermeasures which can prevent the leakages up to certain orders. As a concrete example, threshold implementation (TI) as an efficient way to realize Boolean masking in hardware is able to avoid first-order leakages. Trivially, the attacks conducted at second (and higher) orders can exploit the corresponding leakages hence devastating the provided security. Hence, the extension of TI to higher orders was being expected which has been presented at ASIACRYPT 2014. Following its underlying univariate settings it can provide security at higher orders, and its area and time overheads naturally increase with the desired security order. In this work we look at the feasibility of higher-order attacks on first-order TI from another perspective. Instead of increasing the order of resistance by employing higher-order TIs, we realize the first-order TI designs following the principles of a power-equalization technique dedicated to FPGA platforms, that naturally leads to hardening higher-order attacks. We show that although the first-order TI designs, which are additionally equipped by the power-equalization methodology, have significant area overhead, they can maintain the same throughput and more importantly can avoid the higher-order leakages to be practically exploitable by up to 1 billion traces.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
A minor revision of an IACR publication in CHES 2015
Keywords
side-channel analysiscountermeasurethreshold implementationGliFredFPGAhidingmasking
Contact author(s)
amir moradi @ rub de
History
2015-06-21: received
Short URL
https://ia.cr/2015/597
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/597,
      author = {Amir Moradi and Alexander Wild},
      title = {Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?},
      howpublished = {Cryptology ePrint Archive, Paper 2015/597},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/597}},
      url = {https://eprint.iacr.org/2015/597}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.