The Community for Technology Leaders
45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops (MICROW) (2012)
Vancouver, BC, Canada Canada
Dec. 1, 2012 to Dec. 5, 2012
ISBN: 978-1-4673-4920-8
pp: 9-16
ABSTRACT
We analyze the security of three-share hardware implementations against differential power analysis and advanced variants such as mutual information analysis. We present dedicated distinguishers that allow to recover secret key bits from any cryptographic primitive that is implemented as a sequence of quadratic functions. Starting from the analytical treatment of such distinguishers and information-theoretic arguments, we derive the success probability and required number of traces in the presence of algorithmic noise. We show that attacks on three-share hardware implementation require a number of traces that scales in the third power of the algorithmic noise variance. Finally, we apply and test our model on Keccak in a keyed mode.
INDEX TERMS
Power demand, Registers, Cryptography, Hardware, Mutual information, Noise, Analytical models
CITATION

G. Bertoni, J. Daemen, N. Debande, T. Le, M. Peeters and G. Van Assche, "Power analysis of hardware implementations protected with secret sharing," 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops (MICROW), Vancouver, BC, 2012, pp. 9-16.
doi:10.1109/MICROW.2012.12
106 ms
(Ver 3.3 (11022016))