2019
DOI: 10.46586/tches.v2020.i1.152-174
|View full text |Cite
|
Sign up to set email alerts
|

Share-slicing: Friend or Foe?

Abstract: Masking is a well loved and widely deployed countermeasure against side channel attacks, in particular in software. Under certain assumptions (w.r.t. independence and noise level), masking provably prevents attacks up to a certain security order and leads to a predictable increase in the number of required leakages for successful attacks beyond this order. The noise level in typical processors where software masking is used may not be very high, thus low masking orders are not sufficient for real world securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 15 publications
0
15
0
Order By: Relevance
“…Second, the parallel nature of the sharesliced implementations makes their evaluation significantly easier in terms of statistical modeling, since removing the need to characterize multivariate distributions as in the bitslice case. Finally, shareslicing has been shown to be a more risky solution (than bitslicing) in terms of security order reductions due to glitches when implemented in an ARM Cortex device [GMPO20]. So while not precluding the possibility that sharesliced implementations can lead to secure and efficient designs in other contexts, bitslicing seems to be a more conservative approach for the devices that we investigate in the current state-of-the-art.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Second, the parallel nature of the sharesliced implementations makes their evaluation significantly easier in terms of statistical modeling, since removing the need to characterize multivariate distributions as in the bitslice case. Finally, shareslicing has been shown to be a more risky solution (than bitslicing) in terms of security order reductions due to glitches when implemented in an ARM Cortex device [GMPO20]. So while not precluding the possibility that sharesliced implementations can lead to secure and efficient designs in other contexts, bitslicing seems to be a more conservative approach for the devices that we investigate in the current state-of-the-art.…”
Section: Related Workmentioning
confidence: 99%
“…Then, the same bitwise operation on native words can again be applied. For a masked implementation, a similar approach can be taken by additionally ensuring that each share of a given encoding is placed in a different slice (in order to avoid the shareslicing glitch issue observed in [GMPO20]). Additionally, the bitwise operations are replaced by masked gadgets from such as the ones of Appendix A.…”
Section: Goudarzi and Rivain's Bitslice Masked Implementationsmentioning
confidence: 99%
“…For non-bitsliced designs, accidental unmasking has been demonstrated when a mask m overwrites a masked variable m ⊕ v [1,36] For bitsliced designs, the risk is lower because each share resides at a different bit-index. Still, bitslices may interfere with each other in unexpected manners [19]. In SKIVA, the SUBROT instruction shifts shares over bit-positions using a dedicated data-path.…”
Section: Hardware Support For Aggregated Bitslice Operationsmentioning
confidence: 99%
“…However, as mentioned above, algorithms that use high-order masking are significantly more complex in terms of resources they require, than simple firstorder masking. Moreover, Gao et al [42] demonstrate that glitches may further reduce the security level of masked implementations.…”
Section: A Side-channel Attacksmentioning
confidence: 99%