Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Hardware Masking, Revisited

View through CrossRef
MaskingHardware masking schemes have shown many advances in the past few years. Through a series of publications their implementation cost has dropped significantly and flaws have been fixed where present. Despite these advancements it seems that a limit has been reached when implementing masking schemes on FPGA platforms. Indeed, even with a correct transition from the masking scheme to the masking realization (i.e., when the implementation is not buggy) it has been shown that the implementation can still exhibit unexpected leakage, e.g., through variations in placement and routing. In this work, we show that the reason for such unexpected leakages is the violation of an underlying assumption made by all masking schemes, i.e., that the leakage of the circuit is a linear sum of leakages associated to each share. In addition to the theory of VLSI which supports our claim, we perform a wide range of experiments based on an FPGA) to find out under what circumstances this causes a masked hardware implementation to show undesirable leakage. We further illustrate case studies, where publicly-known secure designs exhibit first-order leakage when being operated at certain conditions.
Title: Hardware Masking, Revisited
Description:
MaskingHardware masking schemes have shown many advances in the past few years.
Through a series of publications their implementation cost has dropped significantly and flaws have been fixed where present.
Despite these advancements it seems that a limit has been reached when implementing masking schemes on FPGA platforms.
Indeed, even with a correct transition from the masking scheme to the masking realization (i.
e.
, when the implementation is not buggy) it has been shown that the implementation can still exhibit unexpected leakage, e.
g.
, through variations in placement and routing.
In this work, we show that the reason for such unexpected leakages is the violation of an underlying assumption made by all masking schemes, i.
e.
, that the leakage of the circuit is a linear sum of leakages associated to each share.
In addition to the theory of VLSI which supports our claim, we perform a wide range of experiments based on an FPGA) to find out under what circumstances this causes a masked hardware implementation to show undesirable leakage.
We further illustrate case studies, where publicly-known secure designs exhibit first-order leakage when being operated at certain conditions.

Related Results

Visual metacontrast masking in migraine
Visual metacontrast masking in migraine
Background: In visual metacontrast masking, the visibility of a brief target stimulus can be reduced substantially if it is preceded (forward masking) or followed (backward masking...
Performance simulation methodologies for hardware/software co-designed processors
Performance simulation methodologies for hardware/software co-designed processors
Recently the community started looking into Hardware/Software (HW/SW) co-designed processors as potential solutions to move towards the less power consuming and the less complex de...
Tinnitus treatment: an experimental study
Tinnitus treatment: an experimental study
Abstract Objective The objective of the present study was to compare the effectiveness of the selected tinnitus management protocols for the experim...
Virtualizable hardware/software design infrastructure for dynamically partially reconfigurable systems
Virtualizable hardware/software design infrastructure for dynamically partially reconfigurable systems
In most existing works, reconfigurable hardware modules are still managed as conventional hardware devices. Further, the software reconfiguration overhead incurred by loading corre...
Masking FALCON’s Floating-Point Multiplication in Hardware
Masking FALCON’s Floating-Point Multiplication in Hardware
Floating-point arithmetic is a cornerstone in a wide array of computational domains, and it recently became a building block for the FALCON post-quantum digital signature algorithm...
To mask, or not to mask, Alice and Bob’s dating dilemma
To mask, or not to mask, Alice and Bob’s dating dilemma
AbstractFace masking in current COVID-19 pandemic seems to be a deceivingly simple decision-making problem due to its multifaceted nature. Questions arising from masking span biome...
Speech perception with temporally patterned noise maskers.
Speech perception with temporally patterned noise maskers.
In the real world, speech perception frequently occurs under adverse listening conditions. Laboratory studies have identified distinct phenomena associated with more or less consta...
Intrinsic Evolvable Hardware Structures
Intrinsic Evolvable Hardware Structures
The main target of this chapter is to present the intrinsic evolvable hardware structures: concept, design and applications. The intrinsic evolvable hardware structures concept joi...

Back to Top