Paper 2025/733

One More Motivation to Use Evaluation Tools, This Time for Hardware Multiplicative Masking of AES

Hemin Rahimi, Technische Universität Darmstadt
Amir Moradi, Technische Universität Darmstadt
Abstract

Safeguarding cryptographic implementations against the increasing threat of Side-Channel Analysis (SCA) attacks is essential. Masking, a countermeasure that randomizes intermediate values, is a cornerstone of such defenses. In particular, SCA-secure implementation of AES, the most-widely used encryption standard, can employ Boolean masking as well as multiplicative masking due to its underlying Galois field operations. However, multiplicative masking is susceptible to vulnerabilities, including the zero-value problem, which has been identified right after theintroduction of multiplicative masking. At CHES 2018, De Meyer et al. proposed a hardware-based approach to manage these challenges and implemented multiplicative masking for AES, incorporating a Kronecker delta function and randomness optimization. In this work, we evaluate their design using the PROLEAD evaluation tool under the glitch- and transition-extended probing model. Our findings reveal a critical vulnerability in their first- and second-order implementation of the Kronecker delta function, stemming from the employed randomness optimization. This leakage compromises the security of their presented masked AES Sbox. After pinpointing the source of such a leakage, we propose an alternative randomness optimization for the first-order design to address this issue, and demonstrate its effectiveness through rigorous evaluations by means of PROLEAD.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Minor revision. DATE 2025
Keywords
Side Channel AnalysisImplementation SecurityMultiplicative MaskingAES
Contact author(s)
rahimihemn @ gmail com
amir moradi @ tu-darmstadt de
History
2025-04-24: approved
2025-04-24: received
See all versions
Short URL
https://ia.cr/2025/733
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/733,
      author = {Hemin Rahimi and Amir Moradi},
      title = {One More Motivation to Use Evaluation Tools, This Time for Hardware Multiplicative Masking of {AES}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/733},
      year = {2025},
      url = {https://eprint.iacr.org/2025/733}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.