Abstract
Most side channel countermeasures for software implementations of cryptography either rely on masking or randomize the execution order of the cryptographic implementation. This work proposes a countermeasure that has constant leakage in common linear leakage models. Constant leakage is achieved not only for internal state values, but also for their transitions. The proposed countermeasure provides perfect protection in the theoretical leakage model. To study the practical relevance of the proposed countermeasure, it is applied to a software implementation of the block cipher Prince. This case study allows us to give realistic values for resulting implementation overheads as well as for the resulting side channel protection levels that can be achieved in realistic implementation scenarios.
Original language | English |
---|---|
Title of host publication | Smart Card Research and Advanced Applications |
Editors | Marc Joye, Amir Moradi |
Number of pages | 15 |
Volume | 8968 |
Place of Publication | Cham |
Publisher | Springer International Publishing |
Publication date | 17.03.2015 |
Pages | 49-63 |
ISBN (Print) | 978-3-319-16762-6 |
ISBN (Electronic) | 978-3-319-16763-3 |
DOIs | |
Publication status | Published - 17.03.2015 |
Event | 13th International Conference on Smart Card Research and Advanced Applications - Paris, France Duration: 05.11.2014 → 07.11.2014 |