Download PDF

ICICS 2006, Date: 2006/12/04 - 2006/12/07, Location: NC, Raleigh

Publication date: 2006-01-01
Volume: 4307 Pages: 529 - 545
ISSN: 3-540-49496-0, 978-3-540-49496-6
Publisher: Springer-Verlag

Lecture Notes in Computer Science

Author:

Nikova, Svetla
Rechberger, Christian ; Rijmen, Vincent ; Ning, P ; Qing, S ; Li, N

Keywords:

cosic, Science & Technology, Technology, Computer Science, Theory & Methods, Computer Science, masking, secret sharing, side-channel attacks, POWER, HARDWARE, MASKING

Abstract:

© Springer-Verlag Berlin Heidelberg 2006. Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Masking techniques are employed to counter side-channel attacks that are based on multiple measurements of the same operation on different data. Most currently known techniques require new random values after every nonlinear operation and they are not effective in the presence of glitches. We present a new method to protect implementations. Our method has a higher computational complexity, but requires random values only at the start, and stays effective in the presence of glitches.