2020
DOI: 10.1007/978-3-030-64837-4_27
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Masked Ciphers: A Not So Random Idea

Abstract: A new approach to the security analysis of hardware-oriented masked ciphers against second-order side-channel attacks is developed. By relying on techniques from symmetric-key cryptanalysis, concrete security bounds are obtained in a variant of the probing model that allows the adversary to make only a bounded, but possibly very large, number of measurements. Specifically, it is formally shown how a boundedquery variant of robust probing security can be reduced to the linear cryptanalysis of masked ciphers. As… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
26
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(27 citation statements)
references
References 37 publications
1
26
0
Order By: Relevance
“…Reduction of the number of required fresh masks per cipher round (due to the composition) is of interesting topics as well. We should refer to the relevant study [BDZ20], which addresses some interesting facts with respect to reusing the masks to refresh the shares between consecutive cipher rounds in higher-order td + 1 masked designs. Further, it has been stated in [BKN19], that when each S-box requires n-bit fresh masks, having 16 S-boxes in a second-order implementation of PRINCE, 4n fresh mask bits are adequate to apply instead of 16n bits, i.e., reusing the fresh masks.…”
Section: Discussionmentioning
confidence: 99%
“…Reduction of the number of required fresh masks per cipher round (due to the composition) is of interesting topics as well. We should refer to the relevant study [BDZ20], which addresses some interesting facts with respect to reusing the masks to refresh the shares between consecutive cipher rounds in higher-order td + 1 masked designs. Further, it has been stated in [BKN19], that when each S-box requires n-bit fresh masks, having 16 S-boxes in a second-order implementation of PRINCE, 4n fresh mask bits are adequate to apply instead of 16n bits, i.e., reusing the fresh masks.…”
Section: Discussionmentioning
confidence: 99%
“…Figure 1: Representation of a threshold circuit assuming an equal number of input and output shares [1].…”
Section: Encodermentioning
confidence: 99%
“…Instead, the Threshold Implementation approach was generalized for second-order security using fresh randomness by the "Consolidating Masking Schemes" (CMS) approach [18]. Only recently a secure extension of the threshold model was proposed for second-order security [1]. Interestingly enough, this extension makes heavy use of the cryptanalytic properties of the shared cipher such as its diffusion layers and nonlinearity of its S-box.…”
Section: Encodermentioning
confidence: 99%
See 2 more Smart Citations