Reducing risks through simplicity: high side-channel security for lazy engineers

被引:1
作者
Bronchain, Olivier [1 ]
Schneider, Tobias [2 ]
Standaert, Francois-Xavier [1 ]
机构
[1] UCLouvain, ICTEAM Inst, Louvain La Neuve, Belgium
[2] NXP Semicond Austria, Gratkorn, Austria
关键词
Side-channel analysis; Masking; Worst-case evaluations; Key-homomorphic PRFs; Learning with rounding; FPGA implementations; ATTACKING; HARDWARE; AES;
D O I
10.1007/s13389-020-00241-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Countermeasures against side-channel attacks are in general expensive, and a lot of research has been devoted to the optimization of their security versus performance trade-off. Besides, a wide literature has also shown that implementing such countermeasures is an error-prone task and requires to deal with various engineering challenges (e.g., physical defaults, compositional errors, ...). This work aims to contribute to this second item, by evaluating the extent to which (almost) key-homomorphic primitives, and in particular a recent PRF instance based on the learning with rounding problem, can lead to easy-to-implement and easier-to-evaluate side-channel-secure designs. We confirm these properties by describing an FPGA implementation that does not require complex (compositional) reasoning in its analysis and can be masked securely under simple design conditions, and for which the evaluation directly scales to arbitrary number of shares. We provide a comprehensive performance and (worst-case) security analysis of our design and compare the obtained results with those of an AES implementation protected with the domain-oriented masking scheme. Results show that simplicity has a cost, which becomes less prohibitive as security requirements increase.
引用
收藏
页码:39 / 55
页数:17
相关论文
共 58 条
[1]  
[Anonymous], 2013, NEWNES
[2]  
[Anonymous], 2016, LNCS, DOI DOI 10.1007/978-3-319-31271-2_14
[3]  
Balasch Josep, 2015, Smart Card Research and Advanced Applications. 13th International Conference, CARDIS 2014. Revised Selected Papers: LNCS 8968, P64, DOI 10.1007/978-3-319-16763-3_5
[4]  
Barthe G., 2016, ACM CCS 2016, P116, DOI DOI 10.1145/2976749.2978427
[5]   Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model [J].
Barthe, Gilles ;
Dupressoir, Francois ;
Faust, Sebastian ;
Gregoire, Benjamin ;
Standaert, Francois-Xavier ;
Strub, Pierre-Yves .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 :535-566
[6]   Verified Proofs of Higher-Order Masking [J].
Barthe, Gilles ;
Belaid, Sonia ;
Dupressoir, Francois ;
Fouque, Pierre-Alain ;
Gregoire, Benjamin ;
Strub, Pierre-Yves .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :457-485
[7]   Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme [J].
Battistello, Alberto ;
Coron, Jean-Sebastien ;
Prouff, Emmanuel ;
Zeitoun, Rina .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :23-39
[8]  
Becker G., TEST VECTOR LEAKAGE
[9]  
Belaïd S, 2014, LECT NOTES COMPUT SC, V8874, P306, DOI 10.1007/978-3-662-45608-8_17
[10]   Improved Side-Channel Analysis of Finite-Field Multiplication [J].
Belaid, Sonia ;
Coron, Jean-Sebastien ;
Fouque, Pierre-Alain ;
Gerard, Benoit ;
Kammerer, Jean-Gabriel ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :395-415