Power Analysis of Hardware Implementations Protected with Secret Sharing

Download Now
Provided by: International Association for Cryptologic Research
Topic: Security
Format: PDF
The authors analyze the security of three-share hardware implementations against differential power analysis and advanced variants such as mutual information analysis. They present dedicated distinguishers that allow to recover secret key bits from any cryptographic primitive that is implemented as a sequence of quadratic functions. Starting from the analytical treatment of such distinguishers and information-theoretic arguments, they derive the success probability and required number of traces in the presence of algorithmic noise. They show that attacks on three-share hardware implementation require a number of traces that scales in the third power of the algorithmic noise variance.
Download Now

Find By Topic