Leakage Squeezing of Order Two

نویسندگان

  • Claude Carlet
  • Jean-Luc Danger
  • Sylvain Guilley
  • Houssem Maghrebi
چکیده

In masking schemes, leakage squeezing is the study of the optimal shares’ representation, that maximizes the resistance order against high-order side-channel attacks. Squeezing the leakage of first-order Boolean masking has been problematized and solved previously in [10]. The solution consists in finding a bijection F that modifies the mask, in such a way that its graph, seen as a code, be of greatest dual distance. This paper studies second-order leakage squeezing, i.e. leakage squeezing with two independent random masks. It is proved that, compared to first-order leakage squeezing, second-order leakage squeezing at least increments (by one unit) the resistance against high-order attacks, such as high-order correlation power analyses (HO-CPA). Now, better improvements over first-order leakage squeezing are possible by relevant constructions of the squeezing bijections pair. We provide with linear bijections that improve by strictly more than one (instead of one) the resistance order. Specifically, when the masking is applied on bytes (which suits AES), resistance against 1st-order (resp. 2nd-order) attacks is possible with one (resp. two) masks. Optimal leakage squeezing with one mask resists HO-CPA of orders up to 5. In this paper, with two masks, we provide resistance against HO-CPA not only of order 5 + 1 = 6, but also of order 7.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Leakage Squeezing Countermeasure against High-Order Attacks

In the recent years, side channel attacks have been widely investigated. In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations. In this context we propose a new concept to hinder attacks of all order: instead of injecting more entropy, we make the most of a single-mask entropy. With specially crafted bijections instanti...

متن کامل

A Study of Entanglement and Squeezing of

We study entanglement and squeezing of a cluster of spin systems under the influence of the two-axis countertwisting Hamiltonian. The squeezing parameters given by Wineland et al and also by Kitagawa et al. are chosen as the criteria of spin squeezing. The criterion of pairwise entanglement is chosen to be the concurrence and that of the bipartite entanglement the linear entropy. We also define...

متن کامل

Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency

This article provides an in-depth study of high-order (HO) Boolean masking countermeasure against side-channel attacks. We introduce the notion of HO-CPA immunity as a metric to characterize a leakage function. We show that this notion intervenes to assess both the resistance against HO-CPA attacks and the amount of leakage. Namely, the HO-CPA immunity, denoted HCI ∈ N, coincides with the lowes...

متن کامل

Analysis of oscillatory flow disturbances and thermal characteristics inside fluidic cells due to fluid leakage and wall slip conditions.

The effects of both fluid leakage and wall slip conditions are studied analytically and numerically on the fluctuation rate in the flow inside non-isothermal disturbed thin films supported by soft seals within a fluidic cell. Flow disturbances due to internal pressure pulsations and external squeezing are considered in this work. The main controlling parameters are found to be the dimensionless...

متن کامل

Analysis of squeezing flow of viscous fluid under the influence of slip and magnetic field: comparative studies of different approximate analytical methods

The various industrial and engineering applications of flow of fluid between parallel plates have continued to generate renewed interests. In this work, a comparative study of approximate analytical methods is carried out using differential transformation,homotopy perturbation, Adomian decomposition, variation of parameter and variational iteration methods for the analysis of a steady two-dimen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012