Rhythmic Keccak: SCA security and low latency in HW
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018•tches.iacr.org
Glitches entail a great issue when securing a cryptographic implementation in hardware.
Several masking schemes have been proposed in the literature that provide security even in
the presence of glitches. The key property that allows this protection was introduced in
threshold implementations as non-completeness. We address crucial points to ensure the
right compliance of this property especially for low-latency implementations. Specifically, we
first discuss the existence of a flaw in DSD 2017 implementation of Keccak by Gross et al. in …
Several masking schemes have been proposed in the literature that provide security even in
the presence of glitches. The key property that allows this protection was introduced in
threshold implementations as non-completeness. We address crucial points to ensure the
right compliance of this property especially for low-latency implementations. Specifically, we
first discuss the existence of a flaw in DSD 2017 implementation of Keccak by Gross et al. in …
Abstract
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches. The key property that allows this protection was introduced in threshold implementations as non-completeness. We address crucial points to ensure the right compliance of this property especially for low-latency implementations. Specifically, we first discuss the existence of a flaw in DSD 2017 implementation of Keccak by Gross et al. in violation of the non-completeness property and propose a solution. We perform a side-channel evaluation on the first-order and second-order implementations of the proposed design where no leakage is detected with up to 55 million traces. Then, we present a method to ensure a non-complete scheme of an unrolled implementation applicable to any order of security or algebraic degree of the shared function. By using this method we design a two-rounds unrolled first-order Keccak-
tches.iacr.org
以上显示的是最相近的搜索结果。 查看全部搜索结果