2017
DOI: 10.4218/etrij.17.0116.0876
|View full text |Cite
|
Sign up to set email alerts
|

Security of Constant Weight Countermeasures

Abstract: This paper investigates the security of constant weight countermeasures, which aim to produce indistinguishable leakage from sensitive variables and intermediate variables, assuming a constant Hamming distance and/or Hamming weight leakages. To investigate the security of recent countermeasures, contrary to many related studies, we assume that the coefficients of the simulated leakage models follow a normal distribution so that we may construct a model with approximately realistic leakages. First, using our si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…A 3-of-6 code-based data encoding countermeasure was proposed for AES cipher in [21]. Both approaches [20,21] have been analyzed in [22] and were found to have prominent leakage to bit-based correlation attacks. Pour and colleagues in [23] proposed 2-of-4 encoding for use in three sets for HW and HD equalization for a SIMON cipher implementation on the microprocessor.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A 3-of-6 code-based data encoding countermeasure was proposed for AES cipher in [21]. Both approaches [20,21] have been analyzed in [22] and were found to have prominent leakage to bit-based correlation attacks. Pour and colleagues in [23] proposed 2-of-4 encoding for use in three sets for HW and HD equalization for a SIMON cipher implementation on the microprocessor.…”
Section: Related Workmentioning
confidence: 99%
“…Software data encoding [19][20][21][22][23] Algorithm level technique that can be applicable for any design.…”
Section: Technique Pros Consmentioning
confidence: 99%
“…In 2011, Hoogvorst et al first tried to bring dual-rail-based schemes of hardware into software [7]. Han [12,13]. The most recent balancing countermeasure based on a Han-like encoding rule is the method proposed by Pour et al [19].…”
Section: Existing Work On Power-balancing Countermeasures By Employimentioning
confidence: 99%
“…In DPL styles, a logic bit a is represented by a 2-bit pair (a, a), where a is the complement bit of a. Hoogvorst et al was the first to attempt to create DPL styles of hardware into software [7]. Since then, several studies, such as constant XOR and look-up table-based (LUT-based) operations, have applied these schemes to symmetric ciphers [10][11][12][13][14][15][16][17][18]. Here, constant operators, such as constant XOR, are modified into operations that always hold the same HW/HD in internal process by using only assembly language.…”
Section: Introductionmentioning
confidence: 99%