Paper 2022/1546
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
Abstract
This paper provides necessary properties to algorithmically secure first-order maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint.
- Keywords
- Masking Micro-architectures Side-channel Analysis Probing Security
- Contact author(s)
-
john gaspoz @ esat kuleuven be
siemen dhooghe @ esat kuleuven be - History
- 2022-11-08: approved
- 2022-11-07: received
- See all versions
- Short URL
- https://ia.cr/2022/1546
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1546, author = {John Gaspoz and Siemen Dhooghe}, title = {Threshold Implementations in Software: Micro-architectural Leakages in Algorithms}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1546}, year = {2022}, url = {https://eprint.iacr.org/2022/1546} }