Trade-Offs for Threshold Implementations Illustrated on AES
2015; Institute of Electrical and Electronics Engineers; Volume: 34; Issue: 7 Linguagem: Inglês
10.1109/tcad.2015.2419623
ISSN1937-4151
AutoresBegül Bilgin, Benedikt Gierlichs, ⋆Svetla Nikova, Ventzislav Nikov, Vincent Rijmen,
Tópico(s)Security and Verification in Computing
ResumoEmbedded cryptographic devices are vulnerable to power analysis attacks. Threshold implementations (TIs) provide provable security against first-order power analysis attacks for hardware and software implementations. Like masking, the approach relies on secret sharing but it differs in the implementation of logic functions. While masking can fail to provide protection due to glitches in the circuit, TIs rely on few assumptions about the hardware and are fully compatible with standard design flows. We investigate two important properties of TIs in detail and point out interesting trade-offs between circuit area and randomness requirements. We propose two new TIs of AES that, starting from a common previously published implementation, illustrate possible trade-offs. We provide concrete ASIC implementation results for all three designs using the same library, and we evaluate the practical security of all three designs on the same FPGA platform. Our analysis allow us to directly compare the security provided by the different trade-offs, and to quantify the associated hardware cost.
Referência(s)