Low Entropy Side-Channel Secure Hardware Implementations
| dc.contributor.author | Dhar, Jhelum | |
| dc.date.accessioned | 2025-12-22T07:01:09Z | |
| dc.date.available | 2025-12-22T07:01:09Z | |
| dc.date.issued | 2025-07-12 | |
| dc.description | dissertation under the supervision of Prof. Dr. Ir. Vincent Rijmen & Prof. Bimal Kumar Roy | en_US |
| dc.description.abstract | The demand for symmetric-key cryptography implemented in hardware is growing due to the increasing need for faster, more efficient, and secure encryption in small devices. However, implementing block ciphers in hardware that are side-channel secure remains a challenging goal. This holds true because there exist sophisticated but well-studied attacks such as Differential Power Analysis, which uses the correlation between power consumption of a device and the information on it to allow attackers with physical access to the cryptographic device to get information about secret data. Masking is one of the techniques that is used to provide security against sidechannel attacks. There are various kinds of masking, including widely recognized Threshold Implementations and Domain-Oriented Masking. However, to mask a secret, one must first generate randomness. Generating secure randomness usually comes at the cost of increased area and time in hardware. In this master’s thesis project, we study ways of reducing or reusing the randomness used in masked hardware implementations of symmetric-key block ciphers and calculate the bounds on the advantage of a threshold probing adversary to determine if the countermeasures preserve security. We then use PROLEAD to verify the probing security and compare its result with our estimations. | en_US |
| dc.identifier.citation | 65p. | en_US |
| dc.identifier.uri | http://hdl.handle.net/10263/7630 | |
| dc.language.iso | en | en_US |
| dc.publisher | Indian Statistical Institute, Kolkata | en_US |
| dc.relation.ispartofseries | M Tech(CRS) Dissertation;23-25 | |
| dc.subject | Symmetric-Key Cryptography, Linear Cryptanalysis, Side-Channel Security, Threshold Implementations, Probing | en_US |
| dc.title | Low Entropy Side-Channel Secure Hardware Implementations | en_US |
| dc.type | Thesis | en_US |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Dissertation-Jhelum Dhar.pdf
- Size:
- 5.16 MB
- Format:
- Adobe Portable Document Format
- Description:
- Dissertations-M Tech (CRS)
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
