Sciweavers

Share
ICISC
2008

Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches

11 years 6 months ago
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operation can be countered by employing masking techniques. In the presence of glitches, most of the currently known masking techniques still leak information during the computation of non-linear functions. We discuss a recently introduced masking method which is based on secret sharing and results in implementations that are provable resistant against first-order sidechannel attacks, even in the presence of glitches. We reduce the hardware requirements of this method and show how to derive provable secure implementations of some non-linear building blocks for cryptographic algorithms. Finally, we provide a provable secure implementation of the block cipher Noekeon and verify the results.
Svetla Nikova, Vincent Rijmen, Martin Schläff
Added 29 Oct 2010
Updated 29 Oct 2010
Type Conference
Year 2008
Where ICISC
Authors Svetla Nikova, Vincent Rijmen, Martin Schläffer
Comments (0)
books