Higher order side-channel attack resilient S-boxes

Liran Lerman, Nikita Veshchikov , Stjepan Picek, Olivier Markowitch

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

3 Citations (Scopus)

Abstract

Masking schemes represent a well-researched and successful option to follow when considering side-channel countermeasures. Still, such measures increase the implementation cost in terms of power consumption, clock cycles, and random numbers generation. In fact, the higher the order of protection against side-channel adversaries, the higher the implementation cost of countermeasures. S-boxes represent the most vulnerable part in an implementation when considering side-channel adversary. In this paper, we investigate how to generate S-boxes that have improved resilience against varying orders of side-channel attacks while having minimal implementation costs. We examine whether S-boxes generated against a certain order of attack also represent a good solution when considering different order of attacks. We demonstrate that we successfully generated S-boxes resilient against a certain physical attack order but the improvements are small. As a result, S-boxes that are resilient against first order attacks stay resilient against higher-order attacks, which saves computational power during the design of higher-order side-channel attacks resilient S-boxes.

Original languageEnglish
Title of host publication2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings
EditorsD.R. Kaeli, M. Pericàs
Place of PublicationNew York
PublisherAssociation for Computing Machinery (ACM)
Pages336-341
Number of pages6
ISBN (Print)978-1-4503-5761-6
DOIs
Publication statusPublished - 2018
Event15th ACM International Conference on Computing Frontiers, CF 2018 - Ischia, Italy
Duration: 8 May 201810 May 2018

Conference

Conference15th ACM International Conference on Computing Frontiers, CF 2018
Country/TerritoryItaly
CityIschia
Period8/05/1810/05/18

Keywords

  • Correlation power analysis
  • Genetic algorithms
  • Higher-order side-channel analysis
  • S-box construction

Fingerprint

Dive into the research topics of 'Higher order side-channel attack resilient S-boxes'. Together they form a unique fingerprint.

Cite this