Authors
Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
Publication date
2012
Conference
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop
Pages
58-75
Publisher
Springer Berlin/Heidelberg
Description
Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device and intermediate values within the computation. Randomization via (Boolean) masking of intermediate values breaks this statistical dependence and thus prevents such attacks (at least up to a certain order). Especially for software implementations, (first-order) masking schemes are popular in academia and industry, albeit typically not as the sole countermeasure. The current practice then is to manually ‘insert’ Boolean masks: essentially software developers need to manipulate low-level assembly language to implement masking. In this paper we make a first step to automate this process, at least for first-order Boolean masking, allowing the development of compilers capable of protecting programs against DPA.
Total citations
20112012201320142015201620172018201920202021202220232024136916811139711465
Scholar articles
A Moss, E Oswald, D Page, M Tunstall - … Hardware and Embedded Systems–CHES 2012: 14th …, 2012
A Moss, E Oswald, D Page, M Tunstall - Cryptology ePrint Archive, 2011