Skip to content

Latest commit

 

History

History
33 lines (20 loc) · 2.79 KB

File metadata and controls

33 lines (20 loc) · 2.79 KB

One More Motivation to Use Evaluation Tools
This Time for Hardware Multiplicative Masking of AES

This repository contains the source code and results related to the article titled One More Motivation to Use Evaluation Tools, This Time for Hardware Multiplicative Masking of AES published at DATE 2025.

Short Description

This work focuses on the security evaluation of the CHES 2018 paper titled Multiplicative Masking for AES in Hardware. Using the PROLEAD tool, we analyzed vulnerabilities in the Kronecker delta function under the glitch-extended and glitch + transition-extended probing models. Our findings revealed critical leakage caused by randomness optimization. To address this, we proposed and validated optimized solutions to ensure first-order security.

This repository provides the implementation the proposed designs, evaluation scripts, and PROLEAD's results supporting our conclusions.

Repository Structure

There are two main folders in this repository:

Sbox_d1

This folder contains the first-order implementation of the AES Sbox in three sub-folders:

  1. Original form: The original implementation of the Sbox with the optimization presented in Multiplicative Masking for AES in Hardware, which exhibits leakage under glitch-extended probing model.
  2. Glitch-robust: The Sbox structure with our proposed randomness optimization, ensuring no leakage under the glitch-extended probing model.
  3. Glitch- and transition-robust: The Sbox structure with our proposed randomness optimization, ensuring no leakage under both glitch-extended and transition-extended probing models.

Kronecker_d2

This folder contains the second-order implementation of the Kronecker delta function in two sub-folders:

  1. Original form: The original implementation of the Kronecker delta function with the optimization presented in Multiplicative Masking for AES in Hardware, which exhibits leakage under glitch-extended probing model.
  2. No optimization: The original implementation of the Kronecker delta function but without any optimization on fresh randomness re-use, which exhibits no leakage.

Contact and Support

For questions or comments, please contact Hemin Rahimi at rahimihemn[at]gmail.com and/or Amir Moradi at amir.moradi[at]tu-darmstadt.de.

Publication

Hemin Rahimi, Amir Moradi: One More Motivation to Use Evaluation Tools, This Time for Hardware Multiplicative Masking of AES. DATE 2025