[Resource Topic] 2012/300: Threshold Implementations of all 3x3 and 4x4 S-boxes

Welcome to the resource topic for 2012/300

Title:
Threshold Implementations of all 3x3 and 4x4 S-boxes

Authors: B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, G. Stütz

Abstract:

Side-channel attacks have proven many hardware implementations of cryptographic algorithms to be vulnerable. A recently proposed masking method, based on secret sharing and multi-party computation methods, introduces a set of sufficient requirements for implementations to be provably resistant against first-order DPA with minimal assumptions on the hardware. The original paper doesn’t describe how to construct the Boolean functions that are to be used in the implementation. In this paper, we derive the functions for all invertible 3 \times 3, 4 \times 4 S-boxes and the 6 \times 4 DES S-boxes. Our methods and observations can also be used to accelerate the search for sharings of larger (e.g. 8 \times 8) S-boxes. Finally, we investigate the cost of such protection.

ePrint: https://eprint.iacr.org/2012/300

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .