Shuffling against side-channel attacks: a comprehensive study with cautionary note

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012(2012)

引用 199|浏览0
暂无评分
摘要
Together with masking, shuffling is one of the most frequently considered solutions to improve the security of small embedded devices against side-channel attacks. In this paper, we provide a comprehensive study of this countermeasure, including improved implementations and a careful information theoretic and security analysis of its different variants. Our analyses lead to important conclusions as they moderate the strong security improvements claimed in previous works. They suggest that simplified versions of shuffling (e.g. using random start indexes) can be significantly weaker than their counterpart using full permutations. We further show with an experimental case study that such simplified versions can be as easy to attack as unprotected implementations. We finally exhibit the existence of "indirect leakages" in shuffled implementations that can be exploited due to the different leakage models of the different resources used in cryptographic implementations. This suggests the design of fully shuffled (and efficient) implementations, were both the execution order of the instructions and the physical resources used are randomized, as an interesting scope for further research.
更多
查看译文
关键词
careful information theoretic,side-channel attack,cautionary note,execution order,cryptographic implementation,comprehensive study,security analysis,different resource,strong security improvement,different variant,different leakage model,experimental case study
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要