Higher-Order Threshold Implementation

Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    100 Citations (Scopus)

    Abstract

    Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking. The existing higher-order masking countermeasures that guarantee security in the presence of glitches use multi-party computation techniques and require a lot of resources in terms of circuit area and randomness. The Threshold Implementation method is also based on multi-party computation but it is more area and randomness efficient. Moreover, it typically requires less clock-cycles since all parties can operate simultaneously. However, so far it is only provable secure against 1st-order DPA. We address this gap and extend the Threshold Implementation technique to higher orders. We define generic constructions and prove their security. To illustrate the approach, we provide 1st, 2nd and 3rd-order DPA-resistant implementations of the block cipher KATAN- 32. Our analysis of 300 million power traces measured from an FPGA implementation supports the security proofs.
    Original languageEnglish
    Title of host publicationAdvances in Cryptology – ASIACRYPT 2014
    Subtitle of host publication20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings
    EditorsPalash Sarkar, Tetsu Iwata
    Place of PublicationLondon
    PublisherSpringer
    Pages326-343
    Number of pages19
    ISBN (Electronic)978-3-662-45608-8
    ISBN (Print)978-3-662-45607-1
    DOIs
    Publication statusPublished - Dec 2014

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume8874
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Keywords

    • EWI-25075
    • METIS-306031
    • IR-92489
    • SCS-Cybersecurity

    Fingerprint Dive into the research topics of 'Higher-Order Threshold Implementation'. Together they form a unique fingerprint.

    Cite this