loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Alessandro Barenghi and Gerardo Pelosi

Affiliation: Politecnico di Milano, Italy

ISBN: 978-989-758-045-1

Keyword(s): Applied Cryptography, Side-channel Attacks.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Security Engineering ; Security in Information Systems ; Software Security

Abstract: Providing sound countermeasures against passive side channel attacks has received large interest in open literature. The scheme proposed in [Ishai et al., 2003] secures a computation against a d-probing adversary splitting it into d+1 shares, albeit with a significant performance overhead (5x to 20x). We maintain that it is possible to apply such countermeasures only to a portion of the cipher implementation, retaining the same computational security, backing a widespread intuition present among practitioners. We provide the sketch of a computationally bound attacker model, adapted as an extension of the one in [Ishai et al., 2003], and detail the resistance metric employed to estimate the computational effort of such an attacker, under sensible assumptions on the characteristic of the device leakage (which is, to the current state of the art, still lacking a complete formalization).

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.25.43.188

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Barenghi, A. and Pelosi, G. (2014). On the Security of Partially Masked Software Implementations.In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 492-499. DOI: 10.5220/0005120504920499

@conference{secrypt14,
author={Alessandro Barenghi. and Gerardo Pelosi.},
title={On the Security of Partially Masked Software Implementations},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={492-499},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005120504920499},
isbn={978-989-758-045-1},
}

TY - CONF

JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - On the Security of Partially Masked Software Implementations
SN - 978-989-758-045-1
AU - Barenghi, A.
AU - Pelosi, G.
PY - 2014
SP - 492
EP - 499
DO - 10.5220/0005120504920499

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.