Breaking Masked Implementations with Many Shares on 32-bit Software Platforms
نویسندگان
چکیده
We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of AES and (candidate to NIST Lightweight Cryptography competition) Clyde, in ARM Cortex-M0 M3 devices. Rather than looking for possibly reduced orders (as frequently considered literature), we directly target these assuming their maximum order aim at reducing noise level thanks multivariate, horizontal analytical attacks. Our investigations point out that device has so limited physical masking is close ineffective. The Cortex-M3 shows a better trend but still requires large number shares provide strong guarantees. Practically, first exhibit full 128-bit key recovery less 10 traces 6-share implementation running on requiring 232 enumeration power. A similar attack performed against with 5 require 1,000 measurements 244 then show positive impact lightweight block ciphers AND gates security, compare our attacks Clyde best reported CHES 2020 CTF. complement experiments careful information theoretic analysis, which allows interpreting results. also discuss conclusions under umbrella “backwards evaluations” recently put forwards Azouaoui et al. finally extrapolate evolution proposed complexities presence additional countermeasures using local random probing model 2020.
منابع مشابه
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
The Advanced Encryption Standard is used in many embedded devices to provide security. In the last years, several researchers have proposed to enhance general-purpose processors with custom instructions to increase the efficiency of cryptographic algorithms. In this work we have evaluated the impact of such instruction set extensions on the implementation security of AES. We have compared sever...
متن کاملOn the Cost of Lazy Engineering for Masked Software Implementations
Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet, its deployment in actual cryptographic devices is well known to be challenging, since designers have to ensure that the leakage corresponding to different shares is independent. Several works have shown that such an independent leakage assumption may be contradicted in practice, because of physical effect...
متن کاملEfficient Software Implementation of AES on 32-bits Platforms
Rijndael is the winner algorithm of the AES contest; therefore it should become the most used symmetric-key cryptographic algorithm. One important application of this new standard is cryptography on smart cards. In this paper we present an optimisation of the Rijndael algorithm to speed up execution on 32-bits processors with memory constraints, such as those used in smart cards. First a theore...
متن کاملLS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
Side-channel analysis is an important issue for the security of embedded cryptographic devices, and masking is one of the most investigated solutions to mitigate such attacks. In this context, efficient masking has recently been considered as a possible criteria for new block cipher designs. Previous proposals in this direction were applicable to different types of masking schemes (e.g. Boolean...
متن کاملFast Implementations of AES on Various Platforms
This paper presents new software speed records for encryption and decryption using the block cipher AES-128 for different architectures. Target platforms are 8-bit AVR microcontrollers, NVIDIA graphics processing units (GPUs) and the Cell broadband engine. The new AVR implementation requires 124.6 and 181.3 cycles per byte for encryption and decryption with a code size of less than two kilobyte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2021
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2021.i3.202-234