Generic Low-Latency Masking

نویسندگان

  • Hannes Groß
  • Rinat Iusupov
  • Roderick Bloem
چکیده

In this work, we introduce a generalized concept for lowlatency masking that is applicable to any implementation and protection order, and (in its extremest form) does not require on-the-fly randomness. The main idea of our approach is to avoid collisions of shared variables in nonlinear circuit parts and to skip the share compression. We show the feasibility of our approach on a full implementation of a one round unrolled Ascon variant and an AES S-box case study. We discuss possible trade-offs to make our approach interesting for practical implementations. As a result we obtain a first-order masked AES S-box that is calculated in a single clock cycle with rather high implementation costs (17.8 kGE), and a two-cycle variant requiring only 6.7 kGE. The sidechannel resistance of our Ascon S-box designs up to order three are then verified using the formal analysis tool of [6]. Furthermore, we introduce a taint checking based verification approach that works specifically for our low-latency approach and allows us to verify large circuits like our low-latency AES S-box design in reasonable time.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Auditory brainstem response latency in forward masking, a marker of sensory deficits in listeners with normal hearing thresholds.

In rodent models, acoustic exposure too modest to elevate hearing thresholds can nonetheless cause auditory nerve fiber deafferentation, interfering with the coding of supra-threshold sound. Low-spontaneous rate nerve fibers, important for encoding acoustic information at supra-threshold levels and in noise, are more susceptible to degeneration than high-spontaneous rate fibers. The change in a...

متن کامل

On the Vulnerability of Low Entropy Masking Schemes

Low Entropy Masking Schemes (LEMS) have been proposed to offer a reasonable tradeoff between the good protection against side-channel attacks offered by masking countermeasures and the high overhead that results from their implementation. Besides the limited analysis done in the original proposals of LEMS, their specific leakage characteristics have not yet been analyzed. This work explores the...

متن کامل

Human frequency-following responses to binaural masking level difference stimuli.

Binaural masking level difference is the behavioral threshold difference between a diotic condition (SoNo) and a dichotic condition with a 180 degrees interaural phase delay of either the signal (SpiNo) or the masker (SoNpi). Threshold disparity is partially related to coincidence-detecting units in the medial superior olive that are sensitive to low-frequency binaural stimuli with interaural p...

متن کامل

Towards Low Latency State Machine Replication for Uncivil Wide-area Networks

We consider the problem of building state machines in a multi-site environment in which there is lack of trust between sites, but not within a site. This system model recognizes the fact that if a server is attacked, then there are larger issues at play than simply masking the failure of the server. We describe the design principles of a low-latency Byzantine state machine protocol, called RAM,...

متن کامل

Contributions of lateral inhibition to object substitution masking and attention

Lateral inhibition, the inhibition of neurons by other neurons at the same level, exists at several levels of the visual system. Implications of lateral inhibition for sensory coding and perception have been investigated with a mathematical model that accounts for many properties of metacontrast masking and brief storage of sensory information. Here that model simulates object substitution mask...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017