Abstracts

 
 
 
 
 
 
 
 
 
 
 
 
 
 

  Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart Side Channel Attacks

  Jean-Luc Danger

 
The masking method is certainly one of the most powerful and easy to design method to protect cryptoprocessors. However concerning the hardware cryptoprocessor the robustness can be seriously diminished by the implementation choice. Another flaw comes powerful attacks like the "shallow" attack targeting not only registers but also xor outputs, and Higher-Order Attacks which aims at attacking multiple internal variables simultaneously. The presentation will show some results of masking security evaluation with different complexity of implementations to hinder first-order attacks and shallow attacks. A table showing estimations of complexity, speed and robustness will also be presented and compared with some Dual-rail with Precharge Logic implementations.