Masking with randomized look up tables: Towards preventing side-channel attacks of all orders

François Xavier Standaert*, Christophe Petit, Nicolas Veyrat-Charvillon

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show that this countermeasure prevents side-channel attacks of all orders during the execution of a protected block cipher implementation, given that some secure precomputations can be performed. Second, we show that taking advantage of the linear diffusion layer in modern block ciphers allows deriving clear arguments for the security of their implementations, that can be easily interpreted by hardware designers. Masking with randomized look up tables allows fast execution times but its memory requirements are high and, depending on the block cipher to protect, can be prohibitive. We believe this proposal brings an interesting connection between former countermeasures against side-channel attacks and recent formal solutions to cope with physical leakage. It illustrates the security vs. performance tradeoff between these complementary approaches and, as a result, highlights simple design guidelines for leakage resilient ciphers.

Original languageEnglish
Title of host publicationCryptography and Security
Subtitle of host publicationFromTheory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
EditorsDavid Naccache
Pages283-299
Number of pages17
DOIs
Publication statusPublished - 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6805 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Masking with randomized look up tables: Towards preventing side-channel attacks of all orders'. Together they form a unique fingerprint.

Cite this