A statistical verification method of random permutations for hiding countermeasure against side-channel attacks

被引:1
作者
Park, Jong-Yeon [1 ,3 ]
Ju, Jang-Won [1 ]
Lee, Wonil [1 ]
Kang, Bo Gyeong [1 ]
Kachi, Yasuyuki [2 ]
Sakurai, Kouichi [3 ]
机构
[1] Samsung Elect Syst LSI, 1-2 Samsungjeonja Ro, Hwaseong, Gyeonggi Do, South Korea
[2] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu 9658580, Japan
[3] Kyushu Univ, Fac Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
关键词
Side channel attack; Countermeasure; Shuffling; Hiding method; Random permutation; Post-quantum cryptography; POWER-ANALYSIS; IMPLEMENTATIONS; ALGORITHM;
D O I
10.1016/j.jisa.2024.103797
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hiding countermeasure is among the best-known secure implementation techniques designed to counteract side-channel attacks. It uses a permutation algorithm to shuffle data. In today's Post-Quantum Cryptography (PQC), hiding countermeasure has earned the limelight for its "shufflability"in lattice-based, and code-based, cryptographic algorithms. In this narrative, most importantly, as a rule, fast generation of permutations is paramount to both efficacy and security of an algorithm. The Fisher-Yates (FY) shuffling method has long been a popular choice for this purpose: the FY method generates randomly shuffled (finite) indices. However, despite its theoretical verity, with the FY method we anticipate the following risks of misuse, which can lead to biased shuffling sequences: (i) incorrect implementation, (ii) poor random source, and (iii) the chosen random number being too small. In this paper, we introduce a new statistical test called "approximate permutation criterion"("APC"). We use it to examine some known cases of misused FY shuffling (i-iii). APC takes into consideration the fact that the super-exponential rate of growth of the factorial function N!, which represents the number of permutations of N indices, defies any meaningful form of statistical tests. With APC one can verify whether the output permutations are biased or not with much lower testing cost. Mathematically, in this paper we introduce the so-called "kth order permutation verification", the underpinning notion upon which APC is based. We also compare APC with full sample space to demonstrate how well it encapsulates the statistical randomness of random permutations. We thereby provide a new method that identifies a bias that exists in the output permutations when implementing FY Shuffling through a visual ratio test and the chi-square (chi(2)) distribution test.
引用
收藏
页数:16
相关论文
共 50 条
[31]   A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [J].
Kordi, Farshideh ;
Hosseintalaee, Hamed ;
Jahanian, Ali .
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01) :47-55
[32]   A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique [J].
Jiao, Zhipeng ;
Chen, Hua ;
Feng, Jingyi ;
Kuang, Xiaoyun ;
Yang, Yiwei ;
Li, Haoyuan ;
Fan, Limin .
CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (02) :199-208
[33]   Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks [J].
Jin, Shan ;
Xu, Minghua ;
Cai, Yiwei .
39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, :1405-1414
[34]   Side-Channel Attacks in a Real Scenario [J].
Tang, Ming ;
Luo, Maixing ;
Zhou, Junfeng ;
Yang, Zhen ;
Guo, Zhipeng ;
Yan, Fei ;
Liu, Liang .
TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) :586-598
[35]   Side-Channel Attacks in a Real Scenario [J].
Ming Tang ;
Maixing Luo ;
Junfeng Zhou ;
Zhen Yang ;
Zhipeng Guo ;
Fei Yan ;
Liang Liu .
Tsinghua Science and Technology, 2018, 23 (05) :586-598
[36]   Side-Channel Attacks on Cryptographic Software [J].
Lawson, Nate .
IEEE SECURITY & PRIVACY, 2009, 7 (06) :65-68
[37]   Optimal Collision Side-Channel Attacks [J].
Glowacz, Cezary ;
Grosso, Vincent .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 :126-140
[38]   An EDA-Friendly Protection Scheme against Side-Channel Attacks [J].
Bayrak, Ali Galip ;
Velickovic, Nikola ;
Regazzoni, Francesco ;
Novo, David ;
Brisk, Philip ;
Ienne, Paolo .
DESIGN, AUTOMATION & TEST IN EUROPE, 2013, :410-415
[39]   Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks [J].
Perin, Guilherme ;
Imbert, Laurent ;
Torres, Lionel ;
Maurine, Philippe .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 :200-215
[40]   Checking Robustness Against EM Side-Channel Attacks Prior to Manufacturing [J].
Poggi, Davide ;
Ordas, Thomas ;
Sarafianos, Alexandre ;
Maurine, Philippe .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (05) :1264-1275