International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Efficient Table-Based Masking with Pre-processing

Authors:
Juelin Zhang
Taoyun Wang
Yiteng Sun
Fanjie Ji
Bohan Wang
Lu Li
Yu Yu
Weijia Wang
Download:
DOI: 10.46586/tches.v2024.i3.273-301
URL: https://tches.iacr.org/index.php/TCHES/article/view/11679
Search ePrint
Search Google
Abstract: Masking is one of the most investigated countermeasures against sidechannel attacks. In a nutshell, it randomly encodes each sensitive variable into a number of shares, and compiles the cryptographic implementation into a masked one that operates over the shares instead of the original sensitive variables. Despite its provable security benefits, masking inevitably introduces additional overhead. Particularly, the software implementation of masking largely slows down the cryptographic implementations and requires a large number of random bits that need to be produced by a true random number generator. In this respect, reducing the< overhead of masking is still an essential and challenging task. Among various known schemes, Table-Based Masking (TBM) stands out as a promising line of work enjoying the advantages of generality to any lookup tables. It also allows the pre-processing paradigm, wherein a pre-processing phase is executed independently of the inputs, and a much more efficient online (using the precomputed tables) phase takes place to calculate the result. Obviously, practicality of pre-processing paradigm relies heavily on the efficiency of online phase and the size of precomputed tables.In this paper, we investigate the TBM scheme that offers a combination of linear complexity (in terms of the security order, denoted as d) during the online phase and small precomputed tables. We then apply our new scheme to the AES-128, and provide an implementation on the ARM Cortex architecture. Particularly, for a security order d = 8, the online phase outperforms the current state-of-the-art AES implementations on embedded processors that are vulnerable to the side-channel attacks. The security order of our scheme is proven in theory and verified by the T-test in practice. Moreover, we investigate the speed overhead associated with the random bit generation in our masking technique. Our findings indicate that the speed overhead can be effectively balanced. This is mainly because that the true random number generator operates in parallel with the processor’s execution, ensuring a constant supply of fresh random bits for the masked computation at regular intervals.
BibTeX
@article{tches-2024-34443,
  title={Efficient Table-Based Masking with Pre-processing},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  publisher={Ruhr-Universität Bochum},
  volume={2024},
  pages={273-301},
  url={https://tches.iacr.org/index.php/TCHES/article/view/11679},
  doi={10.46586/tches.v2024.i3.273-301},
  author={Juelin Zhang and Taoyun Wang and Yiteng Sun and Fanjie Ji and Bohan Wang and Lu Li and Yu Yu and Weijia Wang},
  year=2024
}