A statistical verification method of random permutations for hiding countermeasure against side-channel attacks

被引:1
作者
Park, Jong-Yeon [1 ,3 ]
Ju, Jang-Won [1 ]
Lee, Wonil [1 ]
Kang, Bo Gyeong [1 ]
Kachi, Yasuyuki [2 ]
Sakurai, Kouichi [3 ]
机构
[1] Samsung Elect Syst LSI, 1-2 Samsungjeonja Ro, Hwaseong, Gyeonggi Do, South Korea
[2] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu 9658580, Japan
[3] Kyushu Univ, Fac Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
关键词
Side channel attack; Countermeasure; Shuffling; Hiding method; Random permutation; Post-quantum cryptography; POWER-ANALYSIS; IMPLEMENTATIONS; ALGORITHM;
D O I
10.1016/j.jisa.2024.103797
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hiding countermeasure is among the best-known secure implementation techniques designed to counteract side-channel attacks. It uses a permutation algorithm to shuffle data. In today's Post-Quantum Cryptography (PQC), hiding countermeasure has earned the limelight for its "shufflability"in lattice-based, and code-based, cryptographic algorithms. In this narrative, most importantly, as a rule, fast generation of permutations is paramount to both efficacy and security of an algorithm. The Fisher-Yates (FY) shuffling method has long been a popular choice for this purpose: the FY method generates randomly shuffled (finite) indices. However, despite its theoretical verity, with the FY method we anticipate the following risks of misuse, which can lead to biased shuffling sequences: (i) incorrect implementation, (ii) poor random source, and (iii) the chosen random number being too small. In this paper, we introduce a new statistical test called "approximate permutation criterion"("APC"). We use it to examine some known cases of misused FY shuffling (i-iii). APC takes into consideration the fact that the super-exponential rate of growth of the factorial function N!, which represents the number of permutations of N indices, defies any meaningful form of statistical tests. With APC one can verify whether the output permutations are biased or not with much lower testing cost. Mathematically, in this paper we introduce the so-called "kth order permutation verification", the underpinning notion upon which APC is based. We also compare APC with full sample space to demonstrate how well it encapsulates the statistical randomness of random permutations. We thereby provide a new method that identifies a bias that exists in the output permutations when implementing FY Shuffling through a visual ratio test and the chi-square (chi(2)) distribution test.
引用
收藏
页数:16
相关论文
共 50 条
[21]   Random Addition-chain Based Countermeasure Against Side-channel Attack for Advanced Encryption Standard [J].
Huang Hai ;
Feng Xinxin ;
Liu Hongyu ;
Hou Jiao ;
Zhao Yuying ;
Yin Lili ;
Jiang Jinxing .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (02) :348-354
[22]   Guard-NoC: A protection against Side-Channel Attacks for MPSoCs [J].
Reinbrecht, Cezar ;
Aljuffri, Abdullah ;
Hamdioui, Said ;
Taouil, Mottaqiallah ;
Forlin, Bruno E. ;
Sepulveda, Johanna .
2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, :536-541
[23]   Design and Verification of Secure Cache Wrapper against Access-driven Side-Channel Attacks [J].
Niazmand, Behrad ;
Azad, Siavoosh Payandeh ;
Jervan, Gert ;
Sepulveda, Johanna .
2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, :672-676
[24]   A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks [J].
Abdulgadir, Abubakr ;
Mohajerani, Kamyar ;
Dang, Viet Ba ;
Kaps, Jens-Peter ;
Gaj, Kris .
PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 :224-245
[25]   Efficient Solution to Secure ECC Against Side-channel Attacks [J].
Wu Keke ;
Li Huiyun ;
Zhu Dingju ;
Yu Fengqi .
CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03) :471-475
[26]   How secure is your cache against side-channel attacks? [J].
He, Zecheng ;
Lee, Ruby B. .
50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, :341-353
[27]   Masking against Side-Channel Attacks: A Formal Security Proof [J].
Prouff, Emmanuel ;
Rivain, Matthieu .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 :142-159
[28]   Automated Software Protection for the Masses Against Side-Channel Attacks [J].
Belleville, Nicolas ;
Courousse, Damien ;
Heydemann, Karine ;
Charles, Henri-Pierre .
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 15 (04)
[29]   Error Detection and Recovery for ECC: A New Approach Against Side-Channel Attacks [J].
Ma, Kun ;
Wu, Kaijie .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (04) :627-637
[30]   A Logic Level Countermeasure Against CPA Side Channel Attacks on AES [J].
Menicocci, Renato ;
Trifiletti, Alessandro ;
Trotta, Francesco .
MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, MIXDES 2013, 2013, :403-407