Masking against Side-Channel Attacks: A Formal Security Proof

被引:0
作者
Prouff, Emmanuel [1 ]
Rivain, Matthieu [2 ]
机构
[1] ANSSI, Helsinki, Finland
[2] CryptoExperts, Paris, France
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013 | 2013年 / 7881卷
关键词
POWER ANALYSIS; LEAKAGE; RESISTANT; IMPLEMENTATION; CIRCUITS; MODEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a well-known countermeasure to protect block cipher implementations against side-channel attacks. The principle is to randomly split every sensitive intermediate variable occurring in the computation into d + 1 shares, where d is called the masking order and plays the role of a security parameter. Although widely used in practice, masking is often considered as an empirical solution and its effectiveness is rarely proved. In this paper, we provide a formal security proof for masked implementations of block ciphers. Specifically, we prove that the information gained by observing the leakage from one execution can be made negligible (in the masking order). To obtain this bound, we assume that every elementary calculation in the implementation leaks a noisy function of its input, where the amount of noise can be chosen by the designer (yet linearly bounded). We further assume the existence of a leak-free component that can refresh the masks of shared variables. Our work can be viewed as an extension of the seminal work of Chari et al. published at CRYPTO in 1999 on the soundness of combining masking with noise to thwart side-channel attacks.
引用
收藏
页码:142 / 159
页数:18
相关论文
共 42 条
[1]  
[Anonymous], 2009341 CRYPT EPRINT
[2]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[3]  
Blömer J, 2005, LECT NOTES COMPUT SC, V3357, P69
[4]  
Carlet C, 2012, LECT NOTES COMPUT SC, V7549, P366, DOI 10.1007/978-3-642-34047-5_21
[5]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[6]  
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[7]  
Clavier C, 2001, LECT NOTES COMPUT SC, V1965, P252
[8]  
Coron JS, 2010, LECT NOTES COMPUT SC, V6225, P95, DOI 10.1007/978-3-642-15031-9_7
[9]  
Coron JS, 2001, LECT NOTES COMPUT SC, V1962, P157
[10]  
Di Crescenzo G, 2006, LECT NOTES COMPUT SC, V3876, P225