2009
DOI: 10.1007/978-3-642-10838-9_14
|View full text |Cite
|
Sign up to set email alerts
|

You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation

Abstract: Abstract.Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementations in practice, researchers saw the need of validating security of implementations with formal methods. Three generic S-box implementation methods have been proposed by Prouff el al., together with formal proofs of their security against 1st or 2nd-order side-channel analysis. These methods use a similar combination of mas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…First of all, it has an inherently low security level, because some efficient attacks have reported, such as second-order attacks (that combine two leaking samples in a view to remove their common mask) are very practical. Moreover, there exist efficient techniques, e.g., [34,44], which target the precomputation of MaskedSubBytes. 2.…”
Section: Problemsmentioning
confidence: 99%
“…First of all, it has an inherently low security level, because some efficient attacks have reported, such as second-order attacks (that combine two leaking samples in a view to remove their common mask) are very practical. Moreover, there exist efficient techniques, e.g., [34,44], which target the precomputation of MaskedSubBytes. 2.…”
Section: Problemsmentioning
confidence: 99%
“…Secondly, some current developments in side-channel cryptanalysis indicate that masking might succumb to a so-called horizontal side-channel attack (see e.g. [20,22]). By targeting the table generation phase of a masking scheme, an attacker may succeed to recover the secret key when the signal-to-noise ratio is low.…”
Section: Limitations Of the Security Proofsmentioning
confidence: 99%
“…This method is called masking, and its major advantage with respect to this work is that it can be implemented using standard EDA software. However the recent research discovered a mathematical modification of power analysis that can break the masking approach [10].…”
Section: Types Of Attacks and Countermeasuresmentioning
confidence: 99%