LLTI: Low-Latency Threshold Implementations
نویسندگان
چکیده
With the enormous increase in portable cryptographic devices, physical attacks are becoming similarly popular. One of most common is Side-Channel Analysis (SCA), extremely dangerous due to its non-invasive nature. Threshold Implementations (TI) was proposed as first countermeasure provide provable security masked hardware implementations. While works on masking focused optimizing area requirements, with newer and smaller technologies taking a backseat, low-latency gaining importance. In this work, we revisit scheme by Arribas et al. TCHES 2018 secure unrolled We formalize expand methodology, devise scheme, derived from TI, designed implementations optimized for latency named Low-Latency (LLTI). By applying distributive property leveraging divide-and-conquer strategy, split non-linear operation layers which separately. The result more efficient than former TI any algebraic degree greater two, achieving great optimizations both terms speed area. compare performance first-order LLTI securing cubic gate degree-7 AND without using registers between. achieve 137% maximum frequency 60% reduction gate, 3131 times case compared TI. To further illustrate power our take PRINCE implementation literature and, simply changing S-box version, 46% max. improvement 38% reduction. Moreover, apply AES it 6.9 freq. 47.2%
منابع مشابه
Threshold Implementations
Embedded devices are used pervasively in a wide range of applications some of which require cryptographic algorithms in order to provide security. Today’s standardized algorithms are secure in the black-box model where an adversary has access to several inputs and/or outputs of the algorithm. However, sensitive information, such as the secret key used in the algorithm, can be derived from the p...
متن کاملHigher-Order Threshold Implementations
Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking. The existing higher-order masking countermeasures that guarantee security in the presence of glitches use multi-party computation techniques and require a lot of resources in terms of cir...
متن کاملUniform First-Order Threshold Implementations
Most masking schemes used as a countermeasure against side-channel analysis attacks require an extensive amount of fresh random bits on the fly. This is burdensome especially for lightweight cryptosystems. Threshold implementations (TIs) that are secure against firstorder attacks have the advantage that fresh randomness is not required if the sharing of the underlying function is uniform. Howev...
متن کاملReview of Capacitive Threshold Gate Implementations
This is an in-depth survey paper on capacitive hardware implementations of threshold logic gates. The different VLSI solutions include the switched capacitor and the floating gate and their variations. It will be shown how the distinct original proposals from both categories have evolved to become quite similar. The problems with this kind of implementations are pointed out, and their applicati...
متن کاملDifferential Implementations of Threshold Logic Gates
2. CAPACITIVE SOLUTIONS This paper reviews differential implementations of threshold logic gates, detailing two classes of solutions: capacitive (switched capacitor and floating gate), and conductance/current. The concept underlying capacitive TLGs is the use of an array of capacitors to implement the weighted sum of inputs. The idea was introduced as early as 1966 [6]. Capacitive TLGs can be c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2021
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2021.3123527