%0 Conference Proceedings %T Leakage Squeezing Countermeasure against High-Order Attacks %+ Télécom ParisTech %+ Laboratoire Traitement et Communication de l'Information (LTCI) %A Maghrebi, Houssem %A Guilley, Sylvain %A Danger, Jean-Luc %Z Part 6: Security and Cryptography %< avec comité de lecture %( Lecture Notes in Computer Science %B 5th Workshop on Information Security Theory and Practices (WISTP) %C Heraklion, Crete, Greece %Y Claudio A. Ardagna %Y Jianying Zhou %I Springer %3 Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication %V LNCS-6633 %P 208-223 %8 2011-06-01 %D 2011 %R 10.1007/978-3-642-21040-2_14 %K Higher-Order Differential Power Analysis %K Variance-based Power Attack (VPA) %K Multi-variate Mutual Information Analysis (MMIA) %K Masking Countermeasure %K Leakage Squeezing %K FPGA %Z Computer Science [cs]Conference papers %X In the recent years, side channel attacks have been widely investigated. In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations. In this context we propose a new concept to hinder attacks of all order: instead of injecting more entropy, we make the most of a single-mask entropy. With specially crafted bijections instantiated on the mask path, we manage to reduce the inter-class variance (method we call “leakage squeezing”) so that the leakage distributions become almost independent from the processed data. We present two options for this countermeasure. The first one is based on a recoded memory with a size squared w.r.t. the unprotected requirement, whilst the second one is an enhancement alleviating the requirement for a large memory. We theoretically prove the robustness of those implementations and practically evaluate their security improvements. This is attested by a robustness evaluation based on an information theoretic framework and by a 2O-DPA, an EPA and a multi-variate mutual information analysis (MMIA) attack metric. As opposed to software-oriented 3O-DPA-proof countermeasures that seriously impact the performances, our is hardware-oriented and keeps a complexity similar to that of a standard 2O-attack countermeasure with an almost untouched throughput, which is a predominant feature in computing-intensive applications. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01573295/document %2 https://inria.hal.science/hal-01573295/file/978-3-642-21040-2_14_Chapter.pdf %L hal-01573295 %U https://inria.hal.science/hal-01573295 %~ INSTITUT-TELECOM %~ ENST %~ TELECOM-PARISTECH %~ PARISTECH %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-6633 %~ LTCI %~ COMELEC %~ SSH %~ INSTITUTS-TELECOM