Leakage Power Analysis in Different S-Box Masking Protection Schemes

dc.contributor.authorBahrami, Javad
dc.contributor.authorEbrahimabadi, Mohammad
dc.contributor.authorDanger, Jean-Luc
dc.contributor.authorGuilley, Sylvain
dc.contributor.authorKarimi, Naghmeh
dc.date.accessioned2022-01-31T15:40:21Z
dc.date.available2022-01-31T15:40:21Z
dc.date.issued2021-12-17
dc.description.abstractInternet-of-Things (IoT) devices are natural targets for side-channel attacks. Still, side-channel leakage can be com plex: its modeling can be assisted by statistical tools. Projection of the leakage into an orthonormal basis allows to understand its structure, typically linear (1st-order leakage) or non-linear (sometimes referred to as glitches). In order to ensure cryptosys tems protection, several masking methods have been published. Unfortunately, they follow different strategies; thus it is hard to compare them. Namely, ISW is constructive, GLUT is systematic, RSM is a low-entropy version of GLUT, RSM-ROM is a further optimization aiming at balancing the leakage further, and TI aims at avoiding, by design, the leakage arising from the glitches. In practice, no study has compared these styles on an equal basis. Accordingly, in this paper, we present a consistent methodology relying on a Walsh-Hadamard transform in this respect. We consider different masked implementations of substitution boxes of PRESENT algorithm, as this function is the most leaking in symmetric cryptography. We show that ISW is the most secure among the considered masking implementations. For sure, it takes strong advantage of the knowledge of the PRESENT substitution box equation. Tabulated masking schemes appear as providing a lesser amount of security compared to unprotected counterparts. The leakage is assessed over time, i.e., considering device aging which contributes to mitigate the leakage differently according to the masking style.en_US
dc.description.sponsorshipThe work described in this paper has been supported in part by the National Science Foundation CAREER Award (NSF CNS-1943224).en_US
dc.format.extent6 pagesen_US
dc.genrejournal articlesen_US
dc.genrepreprintsen_US
dc.identifierdoi:10.13016/m2lyln-ltvp
dc.identifier.urihttp://hdl.handle.net/11603/24092
dc.language.isoen_USen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.en_US
dc.titleLeakage Power Analysis in Different S-Box Masking Protection Schemesen_US
dc.typeTexten_US
dcterms.creatorhttps://orcid.org/0000-0002-5825-6637en_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
DATE22_Glitch.pdf
Size:
1.48 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: