eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2017/399

Practical Evaluation of Masking Software Countermeasures on an IoT processor

David McCann and Elisabeth Oswald

Abstract

Implementing cryptography on Internet-of-Things (IoT) devices, that is resilient against side channel analysis, has so far been a task only suitable for specialist software designers in interaction with access to a sophisticated testing facility. Recently a novel tool has been developed, ELMO, which offers the potential to enable non-specialist software developers to evaluate their code w.r.t. power analysis for a popular IoT processor. We explain a crucial extension of ELMO, which enables a user to test higher-order masking schemes much more efficiently than so far possible as well as improve the ease and speed of diagnosing masking errors.

Note: Resubmitted following email exchange with Tancrede Lepoint to clarify publication status.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
IoTmaskingside channel attacks
Contact author(s)
david mccann @ bristol ac uk
History
2017-05-09: received
Short URL
https://ia.cr/2017/399
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/399,
      author = {David McCann and Elisabeth Oswald},
      title = {Practical Evaluation of Masking Software Countermeasures on an IoT processor},
      howpublished = {Cryptology ePrint Archive, Paper 2017/399},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/399}},
      url = {https://eprint.iacr.org/2017/399}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.