|
|
Evaluation of Countermeasures Implementation Based on Boolean
Masking to Thwart Side Channel Attacks
Jean-Luc Danger
|
|
The masking method is certainly one of the most powerful and easy to
design method to protect cryptoprocessors.
However concerning the hardware cryptoprocessor the robustness can be
seriously diminished by the implementation choice.
Another flaw comes powerful attacks like the "shallow" attack targeting
not only registers but also xor outputs, and Higher-Order Attacks which
aims at attacking multiple internal variables simultaneously.
The presentation will show some results of masking security evaluation
with different complexity of implementations to hinder first-order
attacks and shallow attacks.
A table showing estimations of complexity, speed and robustness will
also be presented and compared with some Dual-rail with Precharge Logic
implementations. |
|