Back to Search
Start Over
Algebraic Decomposition for Probing Security
- Source :
- Lecture Notes in Computer Science ISBN: 9783662479889, CRYPTO (1)
- Publication Year :
- 2015
- Publisher :
- Springer Berlin Heidelberg, 2015.
-
Abstract
- The probing security model is very popular to prove the side-channel security of cryptographic implementations protected by masking. A common approach to secure nonlinear functions in this model is to represent them as polynomials over a binary field and to secure their nonlinear multiplications thanks to a method introduced by Ishai, Sahai and Wagner at Crypto 2003. Several schemes based on this approach have been published, leading to the recent proposal of Coron, Roy and Vivek which is currently the best known method when no particular assumption is made on the algebraic structure of the function. In the present paper, we revisit this idea by trading nonlinear multiplications for low-degree functions. Specifically, we introduce an algebraic decomposition approach in which a nonlinear function is represented as a sequence of functions with low algebraic degrees. We therefore focus on the probing-secure evaluation of such low-degree functions and we introduce three novel methods to tackle this particular issue. The paper concludes with a comparative analysis of the proposals, which shows that our algebraic decomposition method outperforms the method of Coron, Roy and Vivek in several realistic contexts.
Details
- ISBN :
- 978-3-662-47988-9
- ISBNs :
- 9783662479889
- Database :
- OpenAIRE
- Journal :
- Lecture Notes in Computer Science ISBN: 9783662479889, CRYPTO (1)
- Accession number :
- edsair.doi...........edb1362bc2f6a0c42ce17b2f2be92ce9