All-or-Nothing Transforms as a countermeasure to differential side-channel analysis

Robert P. McEvoy, Mike Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane

Research output: Contribution to journalArticle (Academic Journal)peer-review

6 Citations (Scopus)

Abstract

Side-channel attacks on hardware implementations of cryptographic algorithms have recently been the focus of much attention in the research community. Differential power analysis (DPA) has been shown to be particularly effective at retrieving secret information stored within an implementation. The design of DPA-resistant systems that are efficient in terms of speed and area poses a significant challenge. All-or-Nothing Transforms are cryptographic transforms, which are currently employed in numerous applications. We examine All-or-Nothing Encryption systems from the DPA perspective. This paper shows that All-or-Nothing cryptosystems, whilst not preventing side-channel leakage, do fundamentally inhibit DPA attacks. Furthermore, we develop extensions to the All-or-Nothing protocol to strengthen the DPA resistance of the cryptosystem, providing a practical alternative to masking countermeasures for symmetric ciphers.

Original languageEnglish
Pages (from-to)291-304
Number of pages14
JournalInternational Journal of Information Security
Volume13
Issue number3
DOIs
Publication statusPublished - Jun 2014

Keywords

  • Side-channel attacks
  • DPA
  • All-or-Nothing Transforms
  • POWER ANALYSIS ATTACKS
  • SECURITY

Fingerprint

Dive into the research topics of 'All-or-Nothing Transforms as a countermeasure to differential side-channel analysis'. Together they form a unique fingerprint.

Cite this