Paper 2017/399

Practical Evaluation of Masking Software Countermeasures on an IoT processor

David McCann and Elisabeth Oswald

Abstract

Implementing cryptography on Internet-of-Things (IoT) devices, that is resilient against side channel analysis, has so far been a task only suitable for specialist software designers in interaction with access to a sophisticated testing facility. Recently a novel tool has been developed, ELMO, which offers the potential to enable non-specialist software developers to evaluate their code w.r.t. power analysis for a popular IoT processor. We explain a crucial extension of ELMO, which enables a user to test higher-order masking schemes much more efficiently than so far possible as well as improve the ease and speed of diagnosing masking errors.

Note: Resubmitted following email exchange with Tancrede Lepoint to clarify publication status.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
IoTmaskingside channel attacks
Contact author(s)
david mccann @ bristol ac uk
History
2017-05-09: received
Short URL
https://ia.cr/2017/399
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/399,
      author = {David McCann and Elisabeth Oswald},
      title = {Practical Evaluation of Masking Software Countermeasures on an IoT processor},
      howpublished = {Cryptology ePrint Archive, Paper 2017/399},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/399}},
      url = {https://eprint.iacr.org/2017/399}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.