1/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
Protecting AES with Shamirs Secret Sharing Scheme Louis Goubin and - - PowerPoint PPT Presentation
Introduction Description of the scheme Complexity analysis Security analysis Conclusion Protecting AES with Shamirs Secret Sharing Scheme Louis Goubin and Ange Martinelli CHES 2011, September 29, Nara Japan 1/26 grid Introduction
1/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
2/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
3/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
4/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
4/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
4/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
5/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
6/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
7/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
8/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
8/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
8/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
8/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
9/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
10/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
i
i )i=0..d
i ← β2t i
i ) ←
d
j · zji
i )i=0..d
11/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
1see full version at http://eprint.iacr.org/2011/516.pdf
11/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
1see full version at http://eprint.iacr.org/2011/516.pdf
12/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
d
i
13/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
i )i=0..d representing the product of b and u
i ) ←
d
d
i )i=0..d
14/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
15/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
16/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
XORs multiplications ˆ2j
RAM (bytes) O1-SSS 36 54 14 6 20 O2-SSS 150 165 21 18 33 Od-SSS 7d3 + 18d2 + 11d 5d3 + 18d2 + 22d + 9 7(d + 1) 3d2 + 3d d2 + 10d + 9 O1-Bool. 20 16 6 6 7 O2-Bool. 56 36 9 16 12 O3-Bool. 108 64 12 20 18 O4-Bool. 176 100 15 48 25 Od-Bool. 7d2 + 12d 4d2 + 8d + 4 3(d + 1) 2d2 + 4d
1 2d2 + 7 2d + 3
17/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
17/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
18/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
19/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
19/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
19/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
20/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
21/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
d+1 2
22/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
23/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
24/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
25/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion
26/26
Introduction Description of the scheme Complexity analysis Security analysis Conclusion