A statistical verification method of random permutations for hiding countermeasure against side-channel attacks

被引:1
|
作者
Park, Jong-Yeon [1 ,3 ]
Ju, Jang-Won [1 ]
Lee, Wonil [1 ]
Kang, Bo Gyeong [1 ]
Kachi, Yasuyuki [2 ]
Sakurai, Kouichi [3 ]
机构
[1] Samsung Elect Syst LSI, 1-2 Samsungjeonja Ro, Hwaseong, Gyeonggi Do, South Korea
[2] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu 9658580, Japan
[3] Kyushu Univ, Fac Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
关键词
Side channel attack; Countermeasure; Shuffling; Hiding method; Random permutation; Post-quantum cryptography; POWER-ANALYSIS; IMPLEMENTATIONS; ALGORITHM;
D O I
10.1016/j.jisa.2024.103797
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hiding countermeasure is among the best-known secure implementation techniques designed to counteract side-channel attacks. It uses a permutation algorithm to shuffle data. In today's Post-Quantum Cryptography (PQC), hiding countermeasure has earned the limelight for its "shufflability"in lattice-based, and code-based, cryptographic algorithms. In this narrative, most importantly, as a rule, fast generation of permutations is paramount to both efficacy and security of an algorithm. The Fisher-Yates (FY) shuffling method has long been a popular choice for this purpose: the FY method generates randomly shuffled (finite) indices. However, despite its theoretical verity, with the FY method we anticipate the following risks of misuse, which can lead to biased shuffling sequences: (i) incorrect implementation, (ii) poor random source, and (iii) the chosen random number being too small. In this paper, we introduce a new statistical test called "approximate permutation criterion"("APC"). We use it to examine some known cases of misused FY shuffling (i-iii). APC takes into consideration the fact that the super-exponential rate of growth of the factorial function N!, which represents the number of permutations of N indices, defies any meaningful form of statistical tests. With APC one can verify whether the output permutations are biased or not with much lower testing cost. Mathematically, in this paper we introduce the so-called "kth order permutation verification", the underpinning notion upon which APC is based. We also compare APC with full sample space to demonstrate how well it encapsulates the statistical randomness of random permutations. We thereby provide a new method that identifies a bias that exists in the output permutations when implementing FY Shuffling through a visual ratio test and the chi-square (chi(2)) distribution test.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks
    Zooker, David
    Elkoni, Matan
    Shalom, Or Ohev
    Weizman, Yoav
    Levi, Itamar
    Keren, Osnat
    Fish, Alexander
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [2] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [3] Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
    Bhasin, Shivam
    Guilley, Sylvain
    Sauvage, Laurent
    Danger, Jean-Luc
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 195 - 207
  • [4] A New Countermeasure against Scan-Based Side-Channel Attacks
    Luo, Yanhui
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1722 - 1725
  • [5] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [6] Using MISR as Countermeasure Against Scan-based Side-channel Attacks
    Ahlawat, Satyadev
    Vaghani, Darshit
    Bazardt, Naveen
    Singh, Virendra
    PROCEEDINGS OF 2018 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS 2018), 2018,
  • [7] A random M-ary method based countermeasure against side channel attacks
    Ahn, M
    Ha, J
    Lee, H
    Moon, S
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 338 - 347
  • [8] A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber
    Xu, Dejun
    Wang, Kai
    Tian, Jing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2025, 72 (03) : 504 - 508
  • [9] Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks
    Barbu, Guillaume
    Battistello, Alberto
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 153 - 168
  • [10] Hardware countermeasure against side-channel attacks based on randomized instruction injection
    He, Zhangqing
    Ao, Tianyong
    Liu, Kai
    Dai, Kui
    He, Z. (ivan_hee@126.com), 1600, Huazhong University of Science and Technology (42): : 128 - 132