Analysis of Software Implemented Low Entropy Masking Schemes

Dan Li, Jiazhe Chen*, An Wang, Xiaoyun Wang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Low Entropy Masking Schemes (LEMS) are countermeasure techniques to mitigate the high performance overhead of masked hardware and software implementations of symmetric block ciphers by reducing the entropy of the mask sets. The security of LEMS depends on the choice of the mask sets. Previous research mainly focused on searching balanced mask sets for hardware implementations. In this paper, we find that those balanced mask sets may have vulnerabilities in terms of absolute difference when applied in software implemented LEMS. The experiments verify that such vulnerabilities certainly make the software LEMS implementations insecure. To fix the vulnerabilities, we present a selection criterion to choose the mask sets. When some feasible mask sets are already picked out by certain searching algorithms, our selection criterion could be a reference factor to help decide on a more secure one for software LEMS.

Original languageEnglish
Article number7206835
JournalSecurity and Communication Networks
Volume2018
DOIs
Publication statusPublished - 2018

Fingerprint

Dive into the research topics of 'Analysis of Software Implemented Low Entropy Masking Schemes'. Together they form a unique fingerprint.

Cite this