2016, 10(1): 131-150. doi: 10.3934/amc.2016.10.131

Complementary dual codes for counter-measures to side-channel attacks

1. 

LAGA, UMR 7539, CNRS, University of Paris VIII and University of Paris XIII, Department of Mathematics, 2 rue de la liberte, 93 526 Saint-Denis Cedex, France

2. 

TELECOM-ParisTech, Crypto Group | Paris-Saclay University | CNRS LTCI, 37/39 rue Dareau, 75 634 Paris Cedex 13, France

Received  December 2014 Revised  September 2015 Published  March 2016

We recall why linear codes with complementary duals (LCD codes) play a role in counter-measures to passive and active side-channel analyses on embedded cryptosystems. The rate and the minimum distance of such LCD codes must be as large as possible. We recall the known primary construction of such codes with cyclic codes, and investigate other constructions, with expanded Reed-Solomon codes and generalized residue codes, for which we study the idempotents. These constructions do not allow to reach all the desired parameters. We study then those secondary constructions which preserve the LCD property, and we characterize conditions under which codes obtained by direct sum, direct product, puncturing, shortening, extending codes, or obtained by the Plotkin sum, can be LCD.
Citation: Claude Carlet, Sylvain Guilley. Complementary dual codes for counter-measures to side-channel attacks. Advances in Mathematics of Communications, 2016, 10 (1) : 131-150. doi: 10.3934/amc.2016.10.131
References:
[1]

S. Barnett, Matrices: Methods and Applications,, Clarendon Press, (1990).

[2]

K. Betsumiya and M. Harada, Binary optimal odd formally self-dual codes,, Des. Codes Crypt., 23 (2001), 11. doi: 10.1023/A:1011203416769.

[3]

S. Bhasin, J.-L. Danger, S. Guilley and Z. Najm, A low-entropy first-degree secure provable masking scheme for resource-constrained devices,, in Workshop Embedded Syst. Sec., (2013). doi: 10.1145/2527317.2527324.

[4]

S. Bhasin, J.-L. Danger, S. Guilley, Z. Najm and X. T. Ngo, Linear complementary dual code improvement to strengthen encoded circuit against hardware trojan horses,, in 2015 IEEE Int. Symp. Hardware-Oriented Sec. Trust, (2015), 82. doi: 10.1109/HST.2015.7140242.

[5]

S. Bhasin, J.-L. Danger, S. Guilley, T. Ngo and L. Sauvage, Hardware trojan horses in cryptographic IP cores,, in FDTC, (2013), 15.

[6]

S. Bhasin, J.-L. Danger, X. T. Ngo, S. Guilley and Z. Najm, Encoding the state of integrated circuits: a proactive and reactive protection against hardware trojans horses,, in Proc. 9th Workshop Embedded Syst. Sec., (2014). doi: 10.1145/2668322.2668329.

[7]

A. Bojilov, A. J. van Zanten and S. M. Dodunekov, Minimal distances in generalized residue codes,, in Proc. 12th Int. Workshop Algebr. Combin. Coding Theory, (2010).

[8]

J. Bringer, C. Carlet, H. Chabanne, S. Guilley and H. Maghrebi, Orthogonal direct sum masking - a smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks,, in WISTP, (2014), 40.

[9]

C. Carlet, Boolean functions for cryptography and error correcting codes,, in Chapter of the Monography Boolean Models and Methods (eds. Y. Crama and P. Hammer), (2010), 257.

[10]

C. Carlet, A. Daif, J.-L. Danger, S. Guilley, Z. Najm, X. T. Ngo and C. Tavernier, Optimized linear complementary codes implementation for hardware trojan prevention,, in 22nd Europ. Conf. Circuit Theory Des., (2015).

[11]

C. Carlet, P. Gaborit, J.-L. Kim and P. Solé, A new class of codes for Boolean masking of cryptographic computations,, IEEE Trans. Inf. Theory, 58 (2012), 6000. doi: 10.1109/TIT.2012.2200651.

[12]

B. Chen, H. Q. Dinh and H. Liu, Repeated-root constacyclic codes of length $2l^mp^n$,, preprint, ().

[13]

J. Etesami, F. Hu and W. Henkel, LCD codes and iterative decoding by projections, a first step towards an intuitive description of iterative decoding,, in GLOBECOM, (2011), 1.

[14]

M. Grassl, Bounds on the minimum distance of linear codes and quantum codes,, available online at , ().

[15]

V. Grosso, F.-X. Standaert and E. Prouff, Low entropy masking schemes, revisited,, in CARDIS (eds. A. Francillon and P. Rohatgi), (2013), 33.

[16]

W. C. Huffman and V. Pless, Fundamentals of Error-Correcting Codes,, Cambridge University Press, (2003). doi: 10.1017/CBO9780511807077.

[17]

W. B. V. Kandasamy, F. Smarandache, R. Sujatha and R. S. R. Durai, Erasure Techniques in MRD Codes,, Infinite Study, (2012).

[18]

S. Ling and C. Xing, Polyadic codes revisited,, IEEE Trans. Inf. Theory, 50 (2004), 200. doi: 10.1109/TIT.2003.821986.

[19]

F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes,, Elsevier, (1977).

[20]

J. L. Massey, Linear codes with complementary duals,, Discrete Math., 106/107 (1992), 337. doi: 10.1016/0012-365X(92)90563-U.

[21]

G. L. Mullen and D. Panario, Handbook of Finite Fields,, Chapman and Hall/CRC, (2013). doi: 10.1201/b15006.

[22]

E. Prouff, M. Rivain and R. Bevan, Statistical Analysis of Second Order Differential Power Analysis,, IEEE Trans. Computers, 58 (2009), 799. doi: 10.1109/TC.2009.15.

[23]

N. Sendrier, Linear codes with complementary duals meet the Gilbert-Varshamov bound,, Discrete Math., 285 (2004), 345. doi: 10.1016/j.disc.2004.05.005.

[24]

A. Sharma, G. K. Bakshi and M. Raka, Polyadic codes of prime power length,, Finite Fields Appl., 13 (2007), 1071. doi: 10.1016/j.ffa.2006.12.006.

[25]

J. H. van Lint and F. J. MacWilliams, Generalized quadratic residue codes,, IEEE Trans. Inf. Theory, 24 (1978), 730. doi: 10.1109/TIT.1978.1055965.

[26]

H. N. Ward, Quadratic residue codes and divisibility,, in Handbook of Coding Theory (eds. V.S. Pless and W.C. Huffman), (1998), 827.

[27]

X. Yang and J. L. Massey, The condition for a cyclic code to have a complementary dual,, Discrete Math., 126 (1994), 391. doi: 10.1016/0012-365X(94)90283-6.

show all references

References:
[1]

S. Barnett, Matrices: Methods and Applications,, Clarendon Press, (1990).

[2]

K. Betsumiya and M. Harada, Binary optimal odd formally self-dual codes,, Des. Codes Crypt., 23 (2001), 11. doi: 10.1023/A:1011203416769.

[3]

S. Bhasin, J.-L. Danger, S. Guilley and Z. Najm, A low-entropy first-degree secure provable masking scheme for resource-constrained devices,, in Workshop Embedded Syst. Sec., (2013). doi: 10.1145/2527317.2527324.

[4]

S. Bhasin, J.-L. Danger, S. Guilley, Z. Najm and X. T. Ngo, Linear complementary dual code improvement to strengthen encoded circuit against hardware trojan horses,, in 2015 IEEE Int. Symp. Hardware-Oriented Sec. Trust, (2015), 82. doi: 10.1109/HST.2015.7140242.

[5]

S. Bhasin, J.-L. Danger, S. Guilley, T. Ngo and L. Sauvage, Hardware trojan horses in cryptographic IP cores,, in FDTC, (2013), 15.

[6]

S. Bhasin, J.-L. Danger, X. T. Ngo, S. Guilley and Z. Najm, Encoding the state of integrated circuits: a proactive and reactive protection against hardware trojans horses,, in Proc. 9th Workshop Embedded Syst. Sec., (2014). doi: 10.1145/2668322.2668329.

[7]

A. Bojilov, A. J. van Zanten and S. M. Dodunekov, Minimal distances in generalized residue codes,, in Proc. 12th Int. Workshop Algebr. Combin. Coding Theory, (2010).

[8]

J. Bringer, C. Carlet, H. Chabanne, S. Guilley and H. Maghrebi, Orthogonal direct sum masking - a smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks,, in WISTP, (2014), 40.

[9]

C. Carlet, Boolean functions for cryptography and error correcting codes,, in Chapter of the Monography Boolean Models and Methods (eds. Y. Crama and P. Hammer), (2010), 257.

[10]

C. Carlet, A. Daif, J.-L. Danger, S. Guilley, Z. Najm, X. T. Ngo and C. Tavernier, Optimized linear complementary codes implementation for hardware trojan prevention,, in 22nd Europ. Conf. Circuit Theory Des., (2015).

[11]

C. Carlet, P. Gaborit, J.-L. Kim and P. Solé, A new class of codes for Boolean masking of cryptographic computations,, IEEE Trans. Inf. Theory, 58 (2012), 6000. doi: 10.1109/TIT.2012.2200651.

[12]

B. Chen, H. Q. Dinh and H. Liu, Repeated-root constacyclic codes of length $2l^mp^n$,, preprint, ().

[13]

J. Etesami, F. Hu and W. Henkel, LCD codes and iterative decoding by projections, a first step towards an intuitive description of iterative decoding,, in GLOBECOM, (2011), 1.

[14]

M. Grassl, Bounds on the minimum distance of linear codes and quantum codes,, available online at , ().

[15]

V. Grosso, F.-X. Standaert and E. Prouff, Low entropy masking schemes, revisited,, in CARDIS (eds. A. Francillon and P. Rohatgi), (2013), 33.

[16]

W. C. Huffman and V. Pless, Fundamentals of Error-Correcting Codes,, Cambridge University Press, (2003). doi: 10.1017/CBO9780511807077.

[17]

W. B. V. Kandasamy, F. Smarandache, R. Sujatha and R. S. R. Durai, Erasure Techniques in MRD Codes,, Infinite Study, (2012).

[18]

S. Ling and C. Xing, Polyadic codes revisited,, IEEE Trans. Inf. Theory, 50 (2004), 200. doi: 10.1109/TIT.2003.821986.

[19]

F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes,, Elsevier, (1977).

[20]

J. L. Massey, Linear codes with complementary duals,, Discrete Math., 106/107 (1992), 337. doi: 10.1016/0012-365X(92)90563-U.

[21]

G. L. Mullen and D. Panario, Handbook of Finite Fields,, Chapman and Hall/CRC, (2013). doi: 10.1201/b15006.

[22]

E. Prouff, M. Rivain and R. Bevan, Statistical Analysis of Second Order Differential Power Analysis,, IEEE Trans. Computers, 58 (2009), 799. doi: 10.1109/TC.2009.15.

[23]

N. Sendrier, Linear codes with complementary duals meet the Gilbert-Varshamov bound,, Discrete Math., 285 (2004), 345. doi: 10.1016/j.disc.2004.05.005.

[24]

A. Sharma, G. K. Bakshi and M. Raka, Polyadic codes of prime power length,, Finite Fields Appl., 13 (2007), 1071. doi: 10.1016/j.ffa.2006.12.006.

[25]

J. H. van Lint and F. J. MacWilliams, Generalized quadratic residue codes,, IEEE Trans. Inf. Theory, 24 (1978), 730. doi: 10.1109/TIT.1978.1055965.

[26]

H. N. Ward, Quadratic residue codes and divisibility,, in Handbook of Coding Theory (eds. V.S. Pless and W.C. Huffman), (1998), 827.

[27]

X. Yang and J. L. Massey, The condition for a cyclic code to have a complementary dual,, Discrete Math., 126 (1994), 391. doi: 10.1016/0012-365X(94)90283-6.

[1]

Haode Yan, Hao Liu, Chengju Li, Shudi Yang. Parameters of LCD BCH codes with two lengths. Advances in Mathematics of Communications, 2018, 12 (3) : 579-594. doi: 10.3934/amc.2018034

[2]

Cem Güneri, Ferruh Özbudak, Funda ÖzdemIr. On complementary dual additive cyclic codes. Advances in Mathematics of Communications, 2017, 11 (2) : 353-357. doi: 10.3934/amc.2017028

[3]

Olof Heden, Martin Hessler. On linear equivalence and Phelps codes. Addendum. Advances in Mathematics of Communications, 2011, 5 (3) : 543-546. doi: 10.3934/amc.2011.5.543

[4]

José Joaquín Bernal, Diana H. Bueno-Carreño, Juan Jacobo Simón. Cyclic and BCH codes whose minimum distance equals their maximum BCH bound. Advances in Mathematics of Communications, 2016, 10 (2) : 459-474. doi: 10.3934/amc.2016018

[5]

Nigel Boston, Jing Hao. The weight distribution of quasi-quadratic residue codes. Advances in Mathematics of Communications, 2018, 12 (2) : 363-385. doi: 10.3934/amc.2018023

[6]

Nabil Bennenni, Kenza Guenda, Sihem Mesnager. DNA cyclic codes over rings. Advances in Mathematics of Communications, 2017, 11 (1) : 83-98. doi: 10.3934/amc.2017004

[7]

Heide Gluesing-Luerssen, Katherine Morrison, Carolyn Troha. Cyclic orbit codes and stabilizer subfields. Advances in Mathematics of Communications, 2015, 9 (2) : 177-197. doi: 10.3934/amc.2015.9.177

[8]

José Ignacio Iglesias Curto. Generalized AG convolutional codes. Advances in Mathematics of Communications, 2009, 3 (4) : 317-328. doi: 10.3934/amc.2009.3.317

[9]

Olof Heden, Martin Hessler. On linear equivalence and Phelps codes. Advances in Mathematics of Communications, 2010, 4 (1) : 69-81. doi: 10.3934/amc.2010.4.69

[10]

Liqin Hu, Qin Yue, Fengmei Liu. Linear complexity of cyclotomic sequences of order six and BCH codes over GF(3). Advances in Mathematics of Communications, 2014, 8 (3) : 297-312. doi: 10.3934/amc.2014.8.297

[11]

Martianus Frederic Ezerman, San Ling, Patrick Solé, Olfa Yemen. From skew-cyclic codes to asymmetric quantum codes. Advances in Mathematics of Communications, 2011, 5 (1) : 41-57. doi: 10.3934/amc.2011.5.41

[12]

Yunwen Liu, Longjiang Qu, Chao Li. New constructions of systematic authentication codes from three classes of cyclic codes. Advances in Mathematics of Communications, 2018, 12 (1) : 1-16. doi: 10.3934/amc.2018001

[13]

Sara D. Cardell, Joan-Josep Climent. An approach to the performance of SPC product codes on the erasure channel. Advances in Mathematics of Communications, 2016, 10 (1) : 11-28. doi: 10.3934/amc.2016.10.11

[14]

Minjia Shi, Daitao Huang, Lin Sok, Patrick Solé. Double circulant self-dual and LCD codes over Galois rings. Advances in Mathematics of Communications, 2019, 13 (1) : 171-183. doi: 10.3934/amc.2019011

[15]

Fatma-Zohra Benahmed, Kenza Guenda, Aicha Batoul, Thomas Aaron Gulliver. Some new constructions of isodual and LCD codes over finite fields. Advances in Mathematics of Communications, 2019, 13 (2) : 281-296. doi: 10.3934/amc.2019019

[16]

Fernando Hernando, Tom Høholdt, Diego Ruano. List decoding of matrix-product codes from nested codes: An application to quasi-cyclic codes. Advances in Mathematics of Communications, 2012, 6 (3) : 259-272. doi: 10.3934/amc.2012.6.259

[17]

Xia Li, Feng Cheng, Chunming Tang, Zhengchun Zhou. Some classes of LCD codes and self-orthogonal codes over finite fields. Advances in Mathematics of Communications, 2019, 13 (2) : 267-280. doi: 10.3934/amc.2019018

[18]

Heide Gluesing-Luerssen, Fai-Lung Tsang. A matrix ring description for cyclic convolutional codes. Advances in Mathematics of Communications, 2008, 2 (1) : 55-81. doi: 10.3934/amc.2008.2.55

[19]

Rafael Arce-Nazario, Francis N. Castro, Jose Ortiz-Ubarri. On the covering radius of some binary cyclic codes. Advances in Mathematics of Communications, 2017, 11 (2) : 329-338. doi: 10.3934/amc.2017025

[20]

Long Yu, Hongwei Liu. A class of $p$-ary cyclic codes and their weight enumerators. Advances in Mathematics of Communications, 2016, 10 (2) : 437-457. doi: 10.3934/amc.2016017

2017 Impact Factor: 0.564

Metrics

  • PDF downloads (9)
  • HTML views (0)
  • Cited by (8)

Other articles
by authors

[Back to Top]