Skip to main content

Complementary Dual Codes for Counter-Measures to Side-Channel Attacks

  • Conference paper
Coding Theory and Applications

Part of the book series: CIM Series in Mathematical Sciences ((CIMSMS,volume 3))

Abstract

We recall why linear codes with complementary duals (LCD codes) play a role in counter-measures to passive and active side-channel analyses on embedded cryptosystems. The rate and the minimum distance of such LCD codes must be as large as possible. We investigate constructions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    “supplementary” would seem more appropriate than “complementary”, but the term is more than 10 year old.

  2. 2.

    For the same reason, we do not exclude i = 0 in the definition of Q above, contrary to the definition of Q when n is a prime, since even if i ≠ 0 is imposed, 0 may belong to Q.

References

  1. Augot, D., Sendrier, N.: Idempotents and the BCH bound. IEEE Trans. Inf. Theory 40(1), 204–207 (1994)

    Article  Google Scholar 

  2. Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: A low-entropy first-degree secure provable masking scheme for resource-constrained devices. In: Proceedings of the Workshop on Embedded Systems Security, WESS’13, New York, 29 Sept 2013, pp. 7:1–7:10. ACM, Montreal. doi:10.1145/2527317.2527324

    Google Scholar 

  3. Bringer, J., Carlet, C., Chabanne, H., Guilley, S., Maghrebi, H.: Orthogonal direct sum masking – a smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks. In: WISTP, Heraklion, June 2014. Volume 8501 of LNCS, pp. 40–56. Springer (2014)

    Google Scholar 

  4. Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257–397. Cambridge University Press, Cambridge (2010). Preliminary version available at: http://www.math.univ-paris13.fr/~carlet/chap-fcts-Bool-corr.pdf

  5. Carlet, C.: Correlation-immune boolean functions for leakage squeezing and rotating s-box masking against side channel attacks. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (eds.) SPACE, Kharagpur, 19th - 23rd October 2013 Volume 8204 of Lecture Notes in Computer Science, pp. 70–74. Springer (2013)

    Google Scholar 

  6. Chen, B., Dinh, H.Q., Liu, H.: Repeated-root constacyclic codes of length 2 m p n. Finite Fields and Their Applications Volume 33, May 2015, pp. 137–159

    Article  MathSciNet  Google Scholar 

  7. Etesami, J., Hu, F., Henkel, W.: LCD codes and iterative decoding by projections, a first step towards an intuitive description of iterative decoding. In: GLOBECOM, Houston, pp. 1–4. IEEE (2011)

    Google Scholar 

  8. Grosso, V., Standaert, F.-X., Prouff, E.: low entropy masking schemes, revisited. In: Francillon, A., Rohatgi, P. (eds.) CARDIS, Berlin. Volume 8419 of LNCS, pp. 33–43. Springer (2013)

    Google Scholar 

  9. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. Elsevier, Amsterdam (1977). ISBN:978-0-444-85193-2

    MATH  Google Scholar 

  10. Massey., J.L.: Linear codes with complementary duals. Discret. Math. 106–107, 337–342 (1992)

    Google Scholar 

  11. Sendrier, N.: Linear codes with complementary duals meet the Gilbert-Varshamov bound. Discret. Math. 285, 345–347 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  12. van Lint, J.H., MacWilliams, F.J.: Generalized quadratic residue codes. IEEE Trans. Inf. Theory 24(6), 730–737 (1978)

    Article  MATH  Google Scholar 

  13. Vasantha Kandasamy, W.B., Smarandache, F., Sujatha, R., Raja Durai, R.S.: Erasure Techniques in MRD Codes. 28 Apr 2012. ISBN-10:1599731770, ISBN-13:978-1599731773

    Google Scholar 

  14. Ward, H.N.: Quadratic residue codes and divisibility. In: Pless, V.S., Huffman, W.C. (eds.) Handbook of Coding Theory, pp. 827–870. Elsevier Science, Amsterdam/New York (1998)

    Google Scholar 

  15. Yang, X., Massey, J.L.: The condition for a cyclic code to have a complementary dual. Discret. Math. 126(1), 391–393 (1994)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The authors are grateful to Patrick Solé for pointing relevant previous art.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Claude Carlet or Sylvain Guilley .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Carlet, C., Guilley, S. (2015). Complementary Dual Codes for Counter-Measures to Side-Channel Attacks. In: Pinto, R., Rocha Malonek, P., Vettori, P. (eds) Coding Theory and Applications. CIM Series in Mathematical Sciences, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-17296-5_9

Download citation

Publish with us

Policies and ethics