Paper 2014/952

Balanced Encoding to Mitigate Power Analysis: A Case Study

Cong Chen, Thomas Eisenbarth, Aria Shahverdi, and Xin Ye

Abstract

Most side channel countermeasures for software implementations of cryptography either rely on masking or randomize the execution order of the cryptographic implementation. This work proposes a countermeasure that has constant leakage in common linear leakage models. Constant leakage is achieved not only for internal state values, but also for their transitions. The proposed countermeasure provides perfect protection in the theoretical leakage model. To study the practical relevance of the proposed countermeasure, it is applied to a software implementation of the block cipher Prince. This case study allows us to give realistic values for resulting implementation overheads as well as for the resulting side channel protection levels that can be achieved in realistic implementation scenarios.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. CARDIS 2014
Contact author(s)
cchen3 @ wpi edu
History
2014-11-21: received
Short URL
https://ia.cr/2014/952
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/952,
      author = {Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye},
      title = {Balanced Encoding to Mitigate Power Analysis: A Case Study},
      howpublished = {Cryptology ePrint Archive, Paper 2014/952},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/952}},
      url = {https://eprint.iacr.org/2014/952}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.