Analysis of Software Implemented Low Entropy Masking Schemes

Dan Li, Jiazhe Chen*, An Wang, Xiaoyun Wang

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

1 引用 (Scopus)

摘要

Low Entropy Masking Schemes (LEMS) are countermeasure techniques to mitigate the high performance overhead of masked hardware and software implementations of symmetric block ciphers by reducing the entropy of the mask sets. The security of LEMS depends on the choice of the mask sets. Previous research mainly focused on searching balanced mask sets for hardware implementations. In this paper, we find that those balanced mask sets may have vulnerabilities in terms of absolute difference when applied in software implemented LEMS. The experiments verify that such vulnerabilities certainly make the software LEMS implementations insecure. To fix the vulnerabilities, we present a selection criterion to choose the mask sets. When some feasible mask sets are already picked out by certain searching algorithms, our selection criterion could be a reference factor to help decide on a more secure one for software LEMS.

源语言英语
文章编号7206835
期刊Security and Communication Networks
2018
DOI
出版状态已出版 - 2018

指纹

探究 'Analysis of Software Implemented Low Entropy Masking Schemes' 的科研主题。它们共同构成独一无二的指纹。

引用此