Side-Channel Information Leakage of Code-Based Masked Implementations

被引:0
作者
Cheng, Wei [1 ]
Rioul, Olivier [1 ]
Liu, Yi [1 ]
Beguinot, Julien [1 ]
Guilley, Sylvain [1 ,2 ]
机构
[1] Inst Polytech Paris, Telecom Paris, LTCI, Palaiseau, France
[2] Secure IC SAS, Paris, France
来源
2022 17TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT) | 2022年
关键词
D O I
10.1109/CWIT55308.2022.9817673
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks (SCAs) are among the most powerful physical attacks against cryptographic implementations. To thwart SCAs, a well-established countermeasure is random masking. A recent code-based masking formalism unifies several known masking schemes and allows one to carry out an all-in-one leakage quantification. In this paper, we investigate how a code-based masked implementation leaks in an information-theoretic setting, where the mutual information measures the impact of both number and positions of probes in the probing attack model. We also establish that the mutual information decreases as the measurement noise variance increases, with an exponent equal to the dual distance of the masking code. Our findings quantitatively connect the attacker's capability to recover secret keys with the actual mutual information leakage of the protected implementation.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 23 条
[1]   Consolidating Inner Product Masking [J].
Balasch, Josep ;
Faust, Sebastian ;
Gierlichs, Benedikt ;
Paglialonga, Clara ;
Standaert, Francois-Xavier .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 :724-754
[2]   SIMPLE APPROXIMATIONS OF THE ERROR FUNCTION Q(X) FOR COMMUNICATIONS APPLICATIONS [J].
BORJESSON, PO ;
SUNDBERG, CEW .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1979, 27 (03) :639-643
[3]  
Bringer J, 2014, LECT NOTES COMPUT SC, V8501, P40, DOI 10.1007/978-3-662-43826-8_4
[4]  
Bruneau N, 2014, LECT NOTES COMPUT SC, V8874, P344, DOI 10.1007/978-3-662-45608-8_19
[5]   Statistical properties of side-channel and fault injection attacks using coding theory [J].
Carlet, Claude ;
Guilley, Sylvain .
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05) :909-933
[6]   Achieving side-channel high-order correlation immunity with leakage squeezing [J].
Carlet, Claude ;
Danger, Jean-Luc ;
Guilley, Sylvain ;
Maghrebi, Houssem ;
Prouff, Emmanuel .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (02) :107-121
[7]  
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[8]  
Cheng W., 2021, IACR T CRYPTOGR HARD
[9]   Optimizing Inner Product Masking Scheme by a Coding Theory Approach [J].
Cheng, Wei ;
Guilley, Sylvain ;
Carlet, Claude ;
Mesnager, Sihem ;
Danger, Jean-Luc .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :220-235
[10]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251