Side-channel analysis of a learning parity with physical noise processor

被引:2
作者
Kamel, Dina [1 ]
Bellizia, Davide [1 ]
Bronchain, Olivier [1 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Univ Catholique Louvain UCLouvain, Ottignies, Belgium
关键词
Learning parity with noise; Side-channel analysis; Authentication; Probabilistic computation; CRYPTOGRAPHY;
D O I
10.1007/s13389-020-00238-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Learning parity with physical noise (LPPN) has been proposed as an assumption on which to build authentication protocols based on the learning parity with noise (LPN) problem. Its first advantage is to reduce the randomness requirements of standard LPN-based protocols, by directly performing erroneous computations so that no (e.g. Bernoulli-distributed) errors have to be generated on chip. At ASHES 2018, an LPPN processor was presented and confirmed the possibility to efficiently generate erroneous computations with the appropriate error rate. Since LPPN computations are key-homomorphic, they are good candidates for improved side-channel security thanks to masking, since they could theoretically lead to masked implementations with overheads that are linear in the number of shares, the analysis of which was left as an open problem. In this paper, we confirm this good potential by analyzing the side-channel security of an LPPN processor. We (1) evaluate the leakage of different parts of the erroneous computations, (2) conclude that intermediate computations that can be targeted with a divide-and-conquer Gaussian template attack are a sweet spot for side-channel attacks, and (3) show that LPPN computations naturally reach a level of noise that makes masking effective, despite further noise addition could be beneficial to reach higher security at lower implementation cost.
引用
收藏
页码:171 / 179
页数:9
相关论文
共 26 条
[1]   Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts [J].
Armknecht, Frederik ;
Hamann, Matthias ;
Mikhalev, Vasily .
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 :1-18
[2]  
Belaïd S, 2014, LECT NOTES COMPUT SC, V8874, P306, DOI 10.1007/978-3-662-45608-8_17
[3]   Improved Side-Channel Analysis of Finite-Field Multiplication [J].
Belaid, Sonia ;
Coron, Jean-Sebastien ;
Fouque, Pierre-Alain ;
Gerard, Benoit ;
Kammerer, Jean-Gabriel ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :395-415
[4]  
Berti F., 2016, CARDIS, P245
[5]   Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations [J].
Bronchain, Olivier ;
Hendrickx, Julien M. ;
Massart, Clement ;
Olshevsky, Alex ;
Standaert, Francois-Xavier .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 :713-737
[6]  
de Cherisey Eloi, 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst., V2019, P49
[7]  
De Cnudde T., 2018, IACR T CRYPTOGR HARD, P123, DOI [10.46586/tches.v2018.i2.123-148, DOI 10.46586/TCHES.V2018.I2.123-148]
[8]   Does Coupling Affect the Security of Masked Implementations? [J].
De Cnudde, Thomas ;
Bilgin, Begul ;
Gierlichs, Benedikt ;
Nikov, Ventzislav ;
Nikova, Svetla ;
Rijmen, Vincent .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 :1-18
[9]   Making Masking Security Proofs Concrete Or How to Evaluate the Security of Any Leaking Device [J].
Duc, Alexandre ;
Faust, Sebastian ;
Standaert, Francois-Xavier .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :401-429
[10]   Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems [J].
Dziembowski, Stefan ;
Faust, Sebastian ;
Herold, Gottfried ;
Journault, Anthony ;
Masny, Daniel ;
Standaert, Francois-Xavier .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 :272-301