## CryptoDB

### Paper: Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency

Authors: Tim Beyne , imec-COSIC, ESAT, KU Leuven, Leuven, Belgium Siemen Dhooghe , imec-COSIC, ESAT, KU Leuven, Leuven, Belgium Amir Moradi , Ruhr University Bochum, Horst Görtz Institute for IT Security, Bochum, Germany Aein Rezaei Shahmirzadi , Ruhr University Bochum, Horst Görtz Institute for IT Security, Bochum, Germany DOI: 10.46586/tches.v2022.i1.679-721 URL: https://tches.iacr.org/index.php/TCHES/article/view/9312 Search ePrint Search Google Slides This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. The main idea lies on a combination of the constructions given by Shahmirzadi and Moradi at CHES 2021, and the theory presented by Beyne et al. at Asiacrypt 2020. The presented masked designs only use a minimal number of shares, i.e., three to achieve second-order security, and we make use of a trick to pair a couple of S-boxes to reduce their latency. The theoretical security analyses of our constructions are based on the linear-cryptanalytic properties of the underlying masked primitive as well as SILVER, the leakage verification tool presented at Asiacrypt 2020. To improve this cryptanalytic analysis, we use the noisy probing model which allows for the inclusion of noise in the framework of Beyne et al. We further provide FPGA-based experimental security analysis confirming second-order protection of our masked implementations.
##### BibTeX
@article{tches-2022-31664,
title={Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency},
journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
publisher={Ruhr-Universität Bochum},
volume={2022, Issue 1},
pages={679-721},
url={https://tches.iacr.org/index.php/TCHES/article/view/9312},
doi={10.46586/tches.v2022.i1.679-721},
author={Tim Beyne and Siemen Dhooghe and Amir Moradi and Aein Rezaei Shahmirzadi},
year=2022
}