Paper 2022/1546

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

John Gaspoz, KU Leuven
Siemen Dhooghe, KU Leuven
Abstract

This paper provides necessary properties to algorithmically secure first-order maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Masking Micro-architectures Side-channel Analysis Probing Security
Contact author(s)
john gaspoz @ esat kuleuven be
siemen dhooghe @ esat kuleuven be
History
2022-11-08: approved
2022-11-07: received
See all versions
Short URL
https://ia.cr/2022/1546
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1546,
      author = {John Gaspoz and Siemen Dhooghe},
      title = {Threshold Implementations in Software: Micro-architectural Leakages in Algorithms},
      howpublished = {Cryptology ePrint Archive, Paper 2022/1546},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/1546}},
      url = {https://eprint.iacr.org/2022/1546}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.