Paper 2024/439

Threshold implementations of cryptographic functions between finite Abelian groups

Enrico Piccione
Abstract

The threshold implementation technique has been proposed in 2006 by Nikova et al. as a countermeasure to mitigate cryptographic side-channel attacks on hardware implementations when the effect of glitches is taken into account. This technique is based on Boolean sharing (also called masking) and it was developed for securing symmetric ciphers such as AES. In 2023, Piccione et al. proposed a general construction of threshold implementations that is universal for S-boxes that are bijective vectorial Boolean function (functions from a binary vector space $\mathbb{F}_{2}^n$ into itself). In this paper, we further generalize the construction and we propose a general theory of threshold implementations for any type of S-boxes. We investigate the case of functions (also not necessarily bijective) that are defined between two finite Abelian groups and we use the definition of threshold implementation given by Dhooghe et al. in 2019 with additive sharing. To show that this generalized notion is as useful as the one for Boolean sharing, we prove that many classical results still hold. An important tool in this theory is the notion of functional degree introduced by Aichinger and Moosbauer in 2021 which generalizes the algebraic degree of a vectorial Boolean function. We show that if $F$ has functional degree (at most) $d$ and the cardinality of the domain is divisible by the cardinality of the codomain, then $F$ admits a threshold implementation $\mathcal{F}$ with $s\geq d+2$ shares in input and $d+2$ shares in output. Moreover, we provide a complete overview on which are the available tools for studying the functional degree and how to represent those functions using a Integer-Valued (IV) polynomial representation. Then we apply our theory for the following applications: defining the inner product masking in our setting, providing a threshold implementation of any multiplication map, and computing the functional degree and the IV polynomial representations of the conversion maps between $\mathbb{F}_p^n$ and $\mathbb{Z}_{p^n}$.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Threshold ImplementationBoolean Functions
Contact author(s)
enrico piccione @ uib no
History
2024-03-15: approved
2024-03-14: received
See all versions
Short URL
https://ia.cr/2024/439
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/439,
      author = {Enrico Piccione},
      title = {Threshold implementations of cryptographic functions between finite Abelian groups},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/439},
      year = {2024},
      url = {https://eprint.iacr.org/2024/439}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.