Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches

  • Authors:
  • Svetla Nikova;Vincent Rijmen;Martin Schläffer

  • Affiliations:
  • Dept. ESAT/SCD-COSIC and IBBT, Katholieke Universiteit Leuven, Heverlee, Belgium B-3001;Dept. ESAT/SCD-COSIC and IBBT, Katholieke Universiteit Leuven, Heverlee, Belgium B-3001 and Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, G ...;Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria A-8010

  • Venue:
  • Information Security and Cryptology --- ICISC 2008
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operation can be countered by employing masking techniques. In the presence of glitches, most of the currently known masking techniques still leak information during the computation of non-linear functions. We discuss a recently introduced masking method which is based on secret sharing and results in implementations that are provable resistant against first-order side-channel attacks, even in the presence of glitches. We reduce the hardware requirements of this method and show how to derive provable secure implementations of some non-linear building blocks for cryptographic algorithms. Finally, we provide a provable secure implementation of the block cipher Noekeon and verify the results.