Security Order of Gate-Level Masking Schemes

被引:0
|
作者
Takarabt, Sofiane [1 ]
Bahrami, Javad [2 ]
Ebrahimabadi, Mohammad [2 ]
Guilley, Sylvain [1 ]
Karimi, Naghmeh [2 ]
机构
[1] Secure IC SAS, F-75014 Paris, France
[2] Univ Maryland Baltimore Cty, Baltimore, MD 21250 USA
关键词
Gate-level masking; number of shares; threshold schemes/threshold implementation (TI); incompleteness order; high-order monovariate attacks; statistical moments of a distribution; Hamming weight least significant bit leakage; 2nd-order leakage of threshold implementation style; THRESHOLD IMPLEMENTATIONS; POWER ANALYSIS; HARDWARE; ATTACKS;
D O I
10.1109/HOST55118.2023.10133208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Masking schemes have been introduced to thwart side-channel attacks. In software applications, attackers can measure leakage at several points in time and combine them to defeat the masking. In hardware gate-level masking, all shares of a masked variable are manipulated at the same time in a nanoscale circuit. In this article, we focus on setups where the attacker uses one mesoscopic probe, which measures an aggregated leakage of all shares. We consider masking schemes where each bit is randomly split (by XOR) into so-called shares (two or more). We analyze two interesting case studies about the interrelationship of attack order vs. the number of shares. First of all, we show that when the unique probe is measuring the sum of each share's individual leakage (so-called Hamming weight model), one measurement can reveal the sensitive unshared value, provided the attacker is able to determine the leakage's least significant bit. Second, we analyze a hardware masking belonging to threshold schemes. Such schemes require fulfilling a so-called incompleteness property, whereby some input shares must be absent from output shares. We analyze a first-order incomplete scheme, i.e., where the number of missing input shares is equal to one. In schemes such as threshold implementation, this requires the number of shares to be strictly more than two. Hence the natural question is whether such a scheme would resist high-order attacks of order also strictly more than two? We answer by the negative, and show that the lowest attack order is two: the security of such a masking scheme is governed by the order of incompleteness and not by the number of shares. We verify our findings using four different sets of experiments including theoretical analysis, digital simulation, HSpice simulation and also real-silicon (FPGA emulation).
引用
收藏
页码:57 / 67
页数:11
相关论文
共 50 条
  • [1] Gate-Level Characterization: Foundations and Hardware Security Applications
    Wei, Sheng
    Meguerdichian, Saro
    Potkonjak, Miodrag
    PROCEEDINGS OF THE 47TH DESIGN AUTOMATION CONFERENCE, 2010, : 222 - 227
  • [2] Gate-Level Information Flow Tracking for Security Lattices
    Hu, Wei
    Mu, Dejun
    Oberg, Jason
    Mao, Baolei
    Tiwari, Mohit
    Sherwood, Timothy
    Kastner, Ryan
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2014, 20 (01) : 1 - 25
  • [3] Gate-Level Masking under a Path-Based Leakage Metric
    Leiserson, Andrew J.
    Marson, Mark E.
    Wachs, Megan A.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 580 - 597
  • [4] Gate-level masking under a path-based leakage metric
    Leiserson, Andrew J.
    Marson, Mark E.
    Wachs, Megan A.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 580 - 597
  • [5] IP protection through gate-level netlist security enhancement
    Meade, Travis
    Zhang, Shaojie
    Jin, Yier
    INTEGRATION-THE VLSI JOURNAL, 2017, 58 : 563 - 570
  • [6] GATE-LEVEL SIMULATION
    DABREU, MA
    IEEE DESIGN & TEST OF COMPUTERS, 1985, 2 (06): : 63 - 71
  • [7] Reliable S-Box Hardware Implementation by Gate-Level Fault Masking Enhancement
    Saeide Sheikhpour
    Ali Mahani
    Nasour Bagheri
    Journal of Control, Automation and Electrical Systems, 2019, 30 : 214 - 228
  • [8] Reliable S-Box Hardware Implementation by Gate-Level Fault Masking Enhancement
    Sheikhpour, Saeide
    Mahani, Ali
    Bagheri, Nasour
    JOURNAL OF CONTROL AUTOMATION AND ELECTRICAL SYSTEMS, 2019, 30 (02) : 214 - 228
  • [9] GATE-LEVEL SIMULATION.
    d'Abreu, Manuel A.
    1600, (02):
  • [10] Software-based Gate-level Information Flow Security for IoT Systems
    Cherupalli, Hari
    Duwe, Henry
    Ye, Weidong
    Kumar, Rakesh
    Sartori, John
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 328 - 340