On the security of balanced encoding countermeasures

Yoo-Seung Won, Philip Hodgers, Maire O'Neill, Dong-Guk Han*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
10 Downloads (Pure)


Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.
Original languageEnglish
Title of host publicationProcceedings of 14th Smart Card Research and Advanced Application Conference CARDIS 2015
EditorsNaofumi Homma, Marcel Medwed
Number of pages15
ISBN (Electronic)9783319312712
ISBN (Print)9783319312705
Publication statusAccepted - 10 Mar 2016
Event14th Smart Card Research and Advanced Application Conference - Bochum, Germany
Duration: 04 Nov 201506 Nov 2015

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference14th Smart Card Research and Advanced Application Conference


  • Balanced Encoding
  • bit-wise CPA
  • PRINCE block cipher


Dive into the research topics of 'On the security of balanced encoding countermeasures'. Together they form a unique fingerprint.

Cite this