Abstract
The goal of every countermeasure is to make the power consumption of a cryptographic device independent of the intermediate values of the cryptographic algorithm. Masking achieves this by randomizing the intermediate values that are processed by the cryptographic device. An advantage of this approach is that it can be implemented at the algorithm level without changing the power consumption characteristics of the cryptographic device. In other words, masking allows making the power consumption independent of the intermediate values, even if the device has a data-dependent power consumption. Masking is one of the countermeasures that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking schemes. Even security proofs have been delivered for some of the schemes. Recently, masking has also been applied to the cell level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Masking. In: Power Analysis Attacks. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-38162-6_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-38162-6_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30857-9
Online ISBN: 978-0-387-38162-6
eBook Packages: Computer ScienceComputer Science (R0)