Title :
On the security of partially masked software implementations
Author :
Alessandro Barenghi;Gerardo Pelosi
Author_Institution :
Department of Electronics, Information and Bioengineering - DEIB Politecnico di Milano, Via G. Ponzio 34/5, I-20133 Milano, Italy
Abstract :
Providing sound countermeasures against passive side channel attacks has received large interest in open literature. The scheme proposed in (Ishai et al., 2003) secures a computation against a d-probing adversary splitting it into d+1 shares, albeit with a significant performance overhead (5× to 20×). We maintain that it is possible to apply such countermeasures only to a portion of the cipher implementation, retaining the same computational security, backing a widespread intuition present among practitioners. We provide the sketch of a computationally bound attacker model, adapted as an extension of the one in (Ishai et al., 2003), and detail the resistance metric employed to estimate the computational effort of such an attacker, under sensible assumptions on the characteristic of the device leakage (which is, to the current state of the art, still lacking a complete formalization).
Keywords :
"Ciphers","Software","Hardware","Computational modeling"
Conference_Titel :
Security and Cryptography (SECRYPT), 2014 11th International Conference on