Formal Verification of Masked Hardware Implementations in the Presence of Glitches

被引:44
作者
Bloem, Roderick [1 ]
Gross, Hannes [1 ]
Iusupov, Rinat [1 ]
Koenighofer, Bettina [1 ]
Mangard, Stefan [1 ]
Winter, Johannes [1 ]
机构
[1] Graz Univ Technol, Inst Appl Informat Proc & Commun IAIK, Inffeldgasse 16a, A-8010 Graz, Austria
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II | 2018年 / 10821卷
基金
奥地利科学基金会; 欧洲研究理事会;
关键词
Masking; Formal verification; Threshold implementations; Hardware security; Side-channel analysis; Private circuits; CIRCUITS; LEAKAGE;
D O I
10.1007/978-3-319-78375-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking provides a high level of resistance against side-channel analysis. However, in practice there are many possible pitfalls when masking schemes are applied, and implementation flaws are easily overlooked. Over the recent years, the formal verification of masked software implementations has made substantial progress. In contrast to software implementations, hardware implementations are inherently susceptible to glitches. Therefore, the same methods tailored for software implementations are not readily applicable. In this work, we introduce a method to formally verify the security of masked hardware implementations that takes glitches into account. Our approach does not require any intermediate modeling steps of the targeted implementation. The verification is performed directly on the circuit's netlist in the probing model with glitches and covers also higher-order flaws. For this purpose, a sound but conservative estimation of the Fourier coefficients of each gate in the netlist is calculated, which characterize statistical dependence of the gates on the inputs and thus allow to predict possible leakages. In contrast to existing practical evaluations, like t-tests, this formal verification approach makes security statements beyond specific measurement methods, the number of evaluated leakage traces, and the evaluated devices. Furthermore, flaws detected by the verifier are automatically localized. We have implemented our method on the basis of a SAT solver and demonstrate the suitability on a range of correctly and incorrectly protected circuits of different masking schemes and for different protection orders. Our verifier is efficient enough to prove the security of a full masked first-order AES S-box, and of the Keccak S-box up to the third protection order.
引用
收藏
页码:321 / 353
页数:33
相关论文
共 39 条
  • [1] [Anonymous], 2013, IACR Cryptol. ePrint Arch
  • [2] [Anonymous], 2014, ANAL BOOLEAN FUNCTIO, DOI DOI 10.1017/CBO9781139814782
  • [3] [Anonymous], LNCS
  • [4] [Anonymous], 2001, LNCS, DOI DOI 10.1007/3-540-45418-7
  • [5] BARTHE G, 2015, IACR CRYPTOLOGY EPRI, V2015, P506
  • [6] Barthe G., 2016, P 2016 ACM SIGSAC C, P116
  • [7] Barthe G., 2017, EASYCRYPT COMPUTER A
  • [8] Verified Proofs of Higher-Order Masking
    Barthe, Gilles
    Belaid, Sonia
    Dupressoir, Francois
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Strub, Pierre-Yves
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 457 - 485
  • [9] Barthe Gilles, 2016, IACR CRYPTOLOGY EPRI, V2016, P912
  • [10] Bayrak AG, 2013, LECT NOTES COMPUT SC, V8086, P293, DOI 10.1007/978-3-642-40349-1_17