Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

Authors

  • John Gaspoz imec-COSIC, ESAT, KU Leuven, Belgium
  • Siemen Dhooghe imec-COSIC, ESAT, KU Leuven, Belgium

DOI:

https://doi.org/10.46586/tches.v2023.i2.155-179

Keywords:

Masking, Micro-architectures, Side-channel Analysis, Probing Security

Abstract

This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis.

Downloads

Published

2023-03-06

Issue

Section

Articles

How to Cite

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms. (2023). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(2), 155-179. https://doi.org/10.46586/tches.v2023.i2.155-179