Abstract
Threshold Implementations provide provable security against first-order power analysis attacks for hardware and software implementations. Like masking, the approach relies on secret sharing but it differs in the implementation of logic functions. At Eurocrypt 2011 Moradi et al. published the to date most compact Threshold Implementation of AES-128 encryption. Their work shows that the number of required random bits may be an additional evaluation criterion, next to area and speed. We present a new Threshold Implementation of AES-128 encryption that is 18% smaller, 7.5% faster and that requires 8% less random bits than the implementation from Eurocrypt 2011. In addition, we provide results of a practical security evaluation based on real power traces in adversary-friendly conditions. They confirm the first-order attack resistance of our implementation and show good resistance against higher-order attacks.
Original language | English |
---|---|
Title of host publication | Progress in Cryptology – AFRICACRYPT 2014 |
Subtitle of host publication | 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings |
Editors | David Pointcheval, Damien Vergnaud |
Place of Publication | Switzerland |
Publisher | Springer |
Pages | 267-284 |
Number of pages | 18 |
ISBN (Print) | 978-3-319-06733-9 |
DOIs | |
Publication status | Published - May 2014 |
Event | 7th International Conference on Cryptology in Africa 2014 - Marrakech, Morocco Duration: 28 May 2014 → 30 May 2014 Conference number: 7 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 8469 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 7th International Conference on Cryptology in Africa 2014 |
---|---|
Abbreviated title | AfricaCrypt 2014 |
Country/Territory | Morocco |
City | Marrakech |
Period | 28/05/14 → 30/05/14 |
Keywords
- SCS-Cybersecurity
- METIS-306030
- IR-91873
- EWI-25074