Abstract
Low Entropy Masking Schemes (LEMS) have been proposed to offer a reasonable tradeoff between the good protection against side-channel attacks offered by masking countermeasures and the high overhead that results from their implementation. Besides the limited analysis done in the original proposals of LEMS, their specific leakage characteristics have not yet been analyzed. This work explores the leakage behavior of these countermeasures and shows two different methods how the leakage can be exploited, even by generic univariate attacks. In particular, an attack that exploits specific properties of RSM for AES as well as a more generic attack making very little assumptions about the underlying LEMS are introduced. All attacks are practically verified by applying them to publicly available leakage samples of the RSM countermeasure.
Original language | English |
---|---|
Title of host publication | Smart Card Research and Advanced Applications |
Editors | Aurélien Francillon, Pankaj Rohatgi |
Number of pages | 17 |
Volume | 8419 |
Place of Publication | Cham |
Publisher | Springer International Publishing |
Publication date | 26.06.2014 |
Pages | 44-60 |
ISBN (Print) | 978-3-319-08301-8 |
ISBN (Electronic) | 978-3-319-08302-5 |
DOIs | |
Publication status | Published - 26.06.2014 |
Event | 12th International Conference on Smart Card Research and Advanced Applications - Berlin, Germany Duration: 27.11.2013 → 29.11.2013 |