Paper 2018/1226
Boolean Exponent Splitting
Michael Tunstall, Louiza Papachristodoulou, and Kostas Papagiannopoulos
Abstract
A typical countermeasure against side-channel attacks consists of masking intermediate values with a random number. In symmetric cryptographic algorithms, Boolean shares of the secret are typically used, whereas in asymmetric algorithms the secret exponent/scalar is typically masked using algebraic properties. This paper presents a new exponent splitting technique with minimal impact on performance based on Boolean shares. More precisely, it is shown how an exponent can be efficiently split into two shares, where the exponent is the XOR sum of the two shares, typically requiring only an extra register and a few register copies per bit. Our novel exponentiation and scalar multiplication algorithms can be randomized for every execution and combined with other blinding techniques. In this way, both the exponent and the intermediate values can be protected against various types of side-channel attacks. We perform a security evaluation of our algorithms using the mutual information framework and provide proofs that they are secure against first-order side-channel attacks. The side-channel resistance of the proposed algorithms is also practically verified with test vector leakage assessment performed on Xilinx's Zynq zc702 evaluation board.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint. MINOR revision.
- Contact author(s)
- tunstallmjt @ gmail com
- History
- 2018-12-30: received
- Short URL
- https://ia.cr/2018/1226
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/1226, author = {Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos}, title = {Boolean Exponent Splitting}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/1226}, year = {2018}, url = {https://eprint.iacr.org/2018/1226} }