Masking Tables—An Underestimated Security Risk

Mike Tunstall, Carolyn A Whitnall, M E Oswald

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

19 Citations (Scopus)

Abstract

The literature on side-channel analysis describes numerous masking schemes designed to protect block ciphers at the implementation level. Such masking schemes typically require the computation of masked tables prior to the execution of an encryption function. In this paper we revisit an attack which directly exploits this computation in such a way as to recover all or some of the masks used. We show that securely implementing masking schemes is only possible where one has access to a significant amount of random numbers.
Original languageEnglish
Title of host publicationFast Software Encryption 2013
PublisherSpringer
Pages425-444
Volume8424
DOIs
Publication statusPublished - 2014

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Fingerprint Dive into the research topics of 'Masking Tables—An Underestimated Security Risk'. Together they form a unique fingerprint.

Cite this