2011
DOI: 10.1007/978-3-642-25578-6_4
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks

Abstract: Abstract. Several types of countermeasures against side-channel attacks are known. The one called masking is of great interest since it can be applied to any protocol and/or algorithm, without nonetheless requiring special care at the implementation level. Masking countermeasures are usually studied with the maximal possible entropy for the masks. However, in practice, this requirement can be viewed as too costly. It is thus relevant to study how the security evolves when the number of mask values decreases. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
27
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 28 publications
(28 citation statements)
references
References 25 publications
1
27
0
Order By: Relevance
“…Even though the randomization of packet lengths makes it harder to infer a search query, it is still possible to guess the target correctly in many cases. There have been numerous attempts to mitigate side-channel leaks in general [13,14], but it is generally considered that preventing every side-channel leak source is very difficult [15]. However, for the particular leak exploited in this paper, it would be easy to implement an efficient countermeasure by sending only packets of a given, fixed size (e.g., the size of the longest possible packet in response of a request).…”
Section: How To Mitigate Side-channel Leaksmentioning
confidence: 99%
“…Even though the randomization of packet lengths makes it harder to infer a search query, it is still possible to guess the target correctly in many cases. There have been numerous attempts to mitigate side-channel leaks in general [13,14], but it is generally considered that preventing every side-channel leak source is very difficult [15]. However, for the particular leak exploited in this paper, it would be easy to implement an efficient countermeasure by sending only packets of a given, fixed size (e.g., the size of the longest possible packet in response of a request).…”
Section: How To Mitigate Side-channel Leaksmentioning
confidence: 99%
“…However, if the mask is drawn randomly from 2 possible masks, too much memory is required to keep all the possible masked S-Boxes. To offer a reasonable solution to balance the security protection and the performance of implementations, Low Entropy Masking Schemes (LEMS) [10,11] are designed by limiting the amount of mask entropy.…”
Section: Introductionmentioning
confidence: 99%
“…Another aspect is the chosen mask set which plays significant roles in security. Some research studied how to select them for hardware implemented LEMS [11,18]. The selection criterion of the mask sets considered finding secure mask sets under two important assumptions [19].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, each of these heuristics has a drawback which may lead to a seriously vulnerable implementation (see [10]). Instead, reducing the entropy of the mask is the idea followed by [30,31]. Use of fewer mask values allows precomputing all masked look-up tables and fit them to the small-size platforms, e.g., smartcards or microcontrollers with a few Kilobytes of flash memory.…”
Section: Introductionmentioning
confidence: 99%