Low Entropy Side-Channel Secure Hardware Implementations

No Thumbnail Available

Date

2025-07-12

Journal Title

Journal ISSN

Volume Title

Publisher

Indian Statistical Institute, Kolkata

Abstract

The demand for symmetric-key cryptography implemented in hardware is growing due to the increasing need for faster, more efficient, and secure encryption in small devices. However, implementing block ciphers in hardware that are side-channel secure remains a challenging goal. This holds true because there exist sophisticated but well-studied attacks such as Differential Power Analysis, which uses the correlation between power consumption of a device and the information on it to allow attackers with physical access to the cryptographic device to get information about secret data. Masking is one of the techniques that is used to provide security against sidechannel attacks. There are various kinds of masking, including widely recognized Threshold Implementations and Domain-Oriented Masking. However, to mask a secret, one must first generate randomness. Generating secure randomness usually comes at the cost of increased area and time in hardware. In this master’s thesis project, we study ways of reducing or reusing the randomness used in masked hardware implementations of symmetric-key block ciphers and calculate the bounds on the advantage of a threshold probing adversary to determine if the countermeasures preserve security. We then use PROLEAD to verify the probing security and compare its result with our estimations.

Description

dissertation under the supervision of Prof. Dr. Ir. Vincent Rijmen & Prof. Bimal Kumar Roy

Keywords

Symmetric-Key Cryptography, Linear Cryptanalysis, Side-Channel Security, Threshold Implementations, Probing

Citation

65p.

Endorsement

Review

Supplemented By

Referenced By