On the Vulnerability of Low Entropy Masking Schemes

Abstract

Low Entropy Masking Schemes (LEMS) have been proposed to offer a reasonable tradeoff between the good protection against side-channel attacks offered by masking countermeasures and the high overhead that results from their implementation. Besides the limited analysis done in the original proposals of LEMS, their specific leakage characteristics have not yet been analyzed. This work explores the leakage behavior of these countermeasures and shows two different methods how the leakage can be exploited, even by generic univariate attacks. In particular, an attack that exploits specific properties of RSM for AES as well as a more generic attack making very little assumptions about the underlying LEMS are introduced. All attacks are practically verified by applying them to publicly available leakage samples of the RSM countermeasure.
Original languageEnglish
Title of host publicationSmart Card Research and Advanced Applications
EditorsAurélien Francillon, Pankaj Rohatgi
Number of pages17
Volume8419
Place of PublicationCham
PublisherSpringer International Publishing
Publication date26.06.2014
Pages44-60
ISBN (Print)978-3-319-08301-8
ISBN (Electronic)978-3-319-08302-5
DOIs
Publication statusPublished - 26.06.2014
Event12th International Conference on Smart Card Research and Advanced Applications - Berlin, Germany
Duration: 27.11.201329.11.2013

Fingerprint

Dive into the research topics of 'On the Vulnerability of Low Entropy Masking Schemes'. Together they form a unique fingerprint.

Cite this