TY - GEN
T1 - Trade-Offs for S-boxes
T2 - Applied Cryptography and Network Security
AU - Carlet, Claude
AU - Heuser, Annelie
AU - Picek, Stjepan
PY - 2017
Y1 - 2017
N2 - When discussing how to improve side-channel resilience of a cipher, an obvious direction is to use various masking or hiding countermeasures. However, such schemes come with a cost, e.g. an increase in the area and/or reduction of the speed. When considering lightweight cryptography and various constrained environments, the situation becomes even more difficult due to numerous implementation restrictions. However, some options are possible like using S-boxes that are easier to mask or (more on a fundamental level), using S-boxes that possess higher inherent side-channel resilience. In this paper we investigate what properties should an S-box possess in order to be more resilient against side-channel attacks. Moreover, we find certain connections between those properties and cryptographic properties like nonlinearity and differential uniformity. Finally, to strengthen our theoretical findings, we give an extensive experimental validation of our results.
AB - When discussing how to improve side-channel resilience of a cipher, an obvious direction is to use various masking or hiding countermeasures. However, such schemes come with a cost, e.g. an increase in the area and/or reduction of the speed. When considering lightweight cryptography and various constrained environments, the situation becomes even more difficult due to numerous implementation restrictions. However, some options are possible like using S-boxes that are easier to mask or (more on a fundamental level), using S-boxes that possess higher inherent side-channel resilience. In this paper we investigate what properties should an S-box possess in order to be more resilient against side-channel attacks. Moreover, we find certain connections between those properties and cryptographic properties like nonlinearity and differential uniformity. Finally, to strengthen our theoretical findings, we give an extensive experimental validation of our results.
UR - http://www.scopus.com/inward/record.url?scp=85022345732&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-61204-1_20
DO - 10.1007/978-3-319-61204-1_20
M3 - Conference contribution
AN - SCOPUS:85022345732
SN - 978-3-319-61203-4
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 393
EP - 414
BT - Applied Cryptography and Network Security
A2 - Gollmann, D.
A2 - Miyaji, A.
A2 - Kikuchi, H.
PB - Springer
CY - Cham
Y2 - 10 July 2017 through 12 July 2017
ER -