LLTI: Low-Latency Threshold Implementations

نویسندگان

چکیده

With the enormous increase in portable cryptographic devices, physical attacks are becoming similarly popular. One of most common is Side-Channel Analysis (SCA), extremely dangerous due to its non-invasive nature. Threshold Implementations (TI) was proposed as first countermeasure provide provable security masked hardware implementations. While works on masking focused optimizing area requirements, with newer and smaller technologies taking a backseat, low-latency gaining importance. In this work, we revisit scheme by Arribas et al. TCHES 2018 secure unrolled We formalize expand methodology, devise scheme, derived from TI, designed implementations optimized for latency named Low-Latency (LLTI). By applying distributive property leveraging divide-and-conquer strategy, split non-linear operation layers which separately. The result more efficient than former TI any algebraic degree greater two, achieving great optimizations both terms speed area. compare performance first-order LLTI securing cubic gate degree-7 AND without using registers between. achieve 137% maximum frequency 60% reduction gate, 3131 times case compared TI. To further illustrate power our take PRINCE implementation literature and, simply changing S-box version, 46% max. improvement 38% reduction. Moreover, apply AES it 6.9 freq. 47.2%

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threshold Implementations

Embedded devices are used pervasively in a wide range of applications some of which require cryptographic algorithms in order to provide security. Today’s standardized algorithms are secure in the black-box model where an adversary has access to several inputs and/or outputs of the algorithm. However, sensitive information, such as the secret key used in the algorithm, can be derived from the p...

متن کامل

Higher-Order Threshold Implementations

Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking. The existing higher-order masking countermeasures that guarantee security in the presence of glitches use multi-party computation techniques and require a lot of resources in terms of cir...

متن کامل

Uniform First-Order Threshold Implementations

Most masking schemes used as a countermeasure against side-channel analysis attacks require an extensive amount of fresh random bits on the fly. This is burdensome especially for lightweight cryptosystems. Threshold implementations (TIs) that are secure against firstorder attacks have the advantage that fresh randomness is not required if the sharing of the underlying function is uniform. Howev...

متن کامل

Review of Capacitive Threshold Gate Implementations

This is an in-depth survey paper on capacitive hardware implementations of threshold logic gates. The different VLSI solutions include the switched capacitor and the floating gate and their variations. It will be shown how the distinct original proposals from both categories have evolved to become quite similar. The problems with this kind of implementations are pointed out, and their applicati...

متن کامل

Differential Implementations of Threshold Logic Gates

2. CAPACITIVE SOLUTIONS This paper reviews differential implementations of threshold logic gates, detailing two classes of solutions: capacitive (switched capacitor and floating gate), and conductance/current. The concept underlying capacitive TLGs is the use of an array of capacitors to implement the weighted sum of inputs. The idea was introduced as early as 1966 [6]. Capacitive TLGs can be c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3123527