skip to main content
10.1145/3338467.3358951acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On Non-Completeness in Threshold Implementations

Published:11 November 2019Publication History

ABSTRACT

In this note we study non-completeness, the key property of Threshold Implementations (TIs). TIs have proved to be a popular method for mitigating side-channel leakage of sensitive information in hardware implementations of cryptographic algorithms.

In particular, we provide a reformulation of non-completeness in terms of set coverings with constraints, and describe a strategy for constructing small such coverings for given parameters.

Our obtained results enable the second order secure hardware implementation of algorithms with cubic functions as components, such as AES and inversion in GF(24), without the need for further decompositions.

References

  1. Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, and Vincent Rijmen. 2018. Rhythmic Keccak: SCA Security and Low Latency in HW. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, 1 (2018), 269--290. https://doi.org/10.13154/tches.v2018.i1.269--290Google ScholarGoogle ScholarCross RefCross Ref
  2. Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. 2014. Higher-order Threshold Implementations. In Proceedings of ASIACRYPT . Lecture Notes in Computer Science, Vol. 8874. 326--343. https://doi.org/10.1007/978-3-662-45608-8_18Google ScholarGoogle ScholarCross RefCross Ref
  3. Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. 2015. Trade-Offs for Threshold Implementations Illustrated on AES. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, Vol. 34, 7 (2015), 1188--1200. https://doi.org/10.1109/TCAD.2015.2419623Google ScholarGoogle Scholar
  4. Thomas De Cnudde, Begül Bilgin, Oscar Reparaz, Ventzislav Nikov, and Svetla Nikova. 2015. Higher-Order Threshold Implementation of the AES S-Box. In Proceedings of CARDIS. Lecture Notes in Computer Science, Vol. 9514. 259--272. https://doi.org/10.1007/978-3-319-31271-2_16Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Karin Gandolfi, Christophe Mourtel, and Francis Olivier. 2001. Electromagnetic Analysis: Concrete Results. In Proceedings of CHES. Lecture Notes in Computer Science, Vol. 2162. 251--261. https://doi.org/10.1007/3-540-44709-1_21Google ScholarGoogle ScholarCross RefCross Ref
  6. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Proceedings of CRYPTO. Lecture Notes in Computer Science, Vol. 1666. 388--397. https://doi.org/10.1007/3-540-48405-1_25Google ScholarGoogle ScholarCross RefCross Ref
  7. Lauren De Meyer, Begül Bilgin, and Oscar Reparaz. 2019. Consolidating Security Notions in Hardware Masking. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, 3 (2019), 119--147. https://doi.org/10.13154/tches.v2019.i3.119--147Google ScholarGoogle ScholarCross RefCross Ref
  8. Svetla Nikova, Christian Rechberger, and Vincent Rijmen. 2006. Threshold Implementations Against Side-channel Attacks and Glitches. In Proceedings of ICICS. Lecture Notes in Computer Science, Vol. 4307. 529--545. https://doi.org/10.1007/11935308_38Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Svetla Nikova, Vincent Rijmen, and Martin Schläffer. 2008. Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. In Proceedings of ICICS. Lecture Notes in Computer Science, Vol. 5461. 218--234. https://doi.org/10.1007/978-3-642-00730-9_14Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, and Ingrid Verbauwhede. 2015. Consolidating Masking Schemes. In Proceedings of CRYPTO. Lecture Notes in Computer Science, Vol. 9215. 764--783. https://doi.org/10.1007/978-3-662-47989-6_37Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. On Non-Completeness in Threshold Implementations

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      TIS'19: Proceedings of ACM Workshop on Theory of Implementation Security Workshop
      November 2019
      43 pages
      ISBN:9781450368278
      DOI:10.1145/3338467

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 November 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader